Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-40188 |
7.7 (3.1)
|
goshs is Missing Write Protection for Parametric Data Values |
patrickhener |
goshs |
2026-04-10T19:43:45.197Z | 2026-04-10T19:43:45.197Z |
| CVE-2026-40046 |
N/A
|
Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ … |
Apache Software Foundation |
Apache ActiveMQ |
2026-04-09T15:58:32.966Z | 2026-04-10T19:41:00.618Z |
| CVE-2026-40185 |
7.1 (3.1)
|
Missing Authorization on Immich Trip Photo Routes in TREK |
mauriceboe |
TREK |
2026-04-10T19:40:16.382Z | 2026-04-10T19:40:16.382Z |
| CVE-2026-40184 |
3.7 (3.1)
|
Unauthenticated Access to Uploaded Files in TREK |
mauriceboe |
TREK |
2026-04-10T19:39:32.442Z | 2026-04-10T19:39:32.442Z |
| CVE-2026-40180 |
7.7 (4.0)
|
Zip Slip Path Traversal in quarkus-openapi-generator A… |
quarkiverse |
quarkus-openapi-generator |
2026-04-10T19:35:53.440Z | 2026-04-10T19:35:53.440Z |
| CVE-2026-40178 |
6.9 (4.0)
|
ajenti.plugin.core has a race conditions in 2FA |
ajenti |
ajenti |
2026-04-10T19:30:47.083Z | 2026-04-10T19:30:47.083Z |
| CVE-2026-40177 |
9.3 (4.0)
|
Password bypass when 2FA is activated |
ajenti |
ajenti |
2026-04-10T19:29:00.851Z | 2026-04-10T19:29:00.851Z |
| CVE-2026-40175 |
10 (3.1)
|
Axios has Unrestricted Cloud Metadata Exfiltration via… |
axios |
axios |
2026-04-10T19:23:52.285Z | 2026-04-10T19:23:52.285Z |
| CVE-2026-40168 |
8.2 (3.1)
|
Postiz has Server-Side Request Forgery via Redirect By… |
gitroomhq |
postiz-app |
2026-04-10T19:20:16.365Z | 2026-04-10T19:20:16.365Z |
| CVE-2026-32252 |
7.7 (3.1)
|
Chartbrew Cross-Tenant Template Export and Secret Disc… |
chartbrew |
chartbrew |
2026-04-10T19:17:53.438Z | 2026-04-10T19:17:53.438Z |
| CVE-2026-30232 |
7.8 (4.0)
|
Chartbrew has SSRF in API Data Connection - No IP Vali… |
chartbrew |
chartbrew |
2026-04-10T19:15:11.439Z | 2026-04-10T19:15:11.439Z |
| CVE-2026-27460 |
6.5 (3.1)
|
Tandoor Recipes Affected by Denial of Service via Reci… |
TandoorRecipes |
recipes |
2026-04-10T19:09:05.883Z | 2026-04-10T19:09:05.883Z |
| CVE-2026-33737 |
5.3 (3.1)
|
Chamilo LMS has an XML External Entity (XXE) Injection |
chamilo |
chamilo-lms |
2026-04-10T19:05:08.873Z | 2026-04-10T19:05:08.873Z |
| CVE-2026-33736 |
6.5 (3.1)
|
Chamilo LMS has an Insecure Direct Object Reference (I… |
chamilo |
chamilo-lms |
2026-04-10T19:03:18.638Z | 2026-04-10T19:03:18.638Z |
| CVE-2026-33710 |
7.5 (3.1)
|
Chamilo LMS has Weak REST API Key Generation (Predictable) |
chamilo |
chamilo-lms |
2026-04-10T18:59:24.111Z | 2026-04-10T18:59:24.111Z |
| CVE-2026-33708 |
6.5 (3.1)
|
Chamilo LMS has REST API PII Exposure via get_user_inf… |
chamilo |
chamilo-lms |
2026-04-10T18:54:35.034Z | 2026-04-10T18:54:35.034Z |
| CVE-2026-33707 |
9.4 (3.1)
|
Weak Password Recovery Mechanism for Forgotten Passwor… |
chamilo |
chamilo-lms |
2026-04-10T18:52:54.097Z | 2026-04-10T18:52:54.097Z |
| CVE-2026-33706 |
7.1 (3.1)
|
Chamilo LMS has a REST API Self-Privilege Escalation (… |
chamilo |
chamilo-lms |
2026-04-10T18:51:23.824Z | 2026-04-10T18:51:23.824Z |
| CVE-2026-33266 |
N/A
|
Apache OpenMeetings: Hardcoded Remember-Me Cookie Encr… |
Apache Software Foundation |
Apache OpenMeetings |
2026-04-09T15:52:36.105Z | 2026-04-10T18:49:13.351Z |
| CVE-2026-33618 |
8.8 (3.1)
|
Chamilo LMS Affected by Remote Code Execution via eval… |
chamilo |
chamilo-lms |
2026-04-10T18:10:16.691Z | 2026-04-10T18:46:09.585Z |
| CVE-2026-5867 |
6.5 (3.1)
|
Heap buffer overflow in WebML in Google Chrome pr… |
Google |
Chrome |
2026-04-08T21:20:43.173Z | 2026-04-10T18:45:24.503Z |
| CVE-2026-33005 |
N/A
|
Apache OpenMeetings: Insufficient checks in FileWebService |
Apache Software Foundation |
Apache OpenMeetings |
2026-04-09T15:52:50.770Z | 2026-04-10T18:44:45.976Z |
| CVE-2026-5864 |
6.5 (3.1)
|
Heap buffer overflow in WebAudio in Google Chrome… |
Google |
Chrome |
2026-04-08T21:20:41.982Z | 2026-04-10T18:44:16.825Z |
| CVE-2026-5869 |
6.5 (3.1)
|
Heap buffer overflow in WebML in Google Chrome pr… |
Google |
Chrome |
2026-04-08T21:20:43.915Z | 2026-04-10T18:40:08.229Z |
| CVE-2026-32990 |
N/A
|
Apache Tomcat: Fix for CVE-2025-66614 is incomplete |
Apache Software Foundation |
Apache Tomcat |
2026-04-09T19:23:49.618Z | 2026-04-10T18:39:25.498Z |
| CVE-2026-5886 |
7.5 (3.1)
|
Out of bounds read in WebAudio in Google Chrome o… |
Google |
Chrome |
2026-04-08T21:20:51.484Z | 2026-04-10T18:38:56.084Z |
| CVE-2025-14545 |
6.5 (3.1)
|
YML for Yandex Market < 5.0.26 - Shop Manager+ RCE via… |
Unknown |
YML for Yandex Market |
2026-04-10T06:00:13.825Z | 2026-04-10T18:37:24.983Z |
| CVE-2026-4432 |
6.5 (3.1)
|
YITH WooCommerce Wishlist < 4.13.0 - Unauthenticated A… |
Unknown |
YITH WooCommerce Wishlist |
2026-04-10T06:00:15.515Z | 2026-04-10T18:35:19.917Z |
| CVE-2026-24880 |
N/A
|
Apache Tomcat: Request smuggling via invalid chunk extension |
Apache Software Foundation |
Apache Tomcat |
2026-04-09T19:12:10.730Z | 2026-04-10T18:33:49.308Z |
| CVE-2026-33705 |
5.3 (3.1)
|
Chamilo LMS has unauthenticated access to Twig templat… |
chamilo |
chamilo-lms |
2026-04-10T18:32:45.193Z | 2026-04-10T18:33:44.062Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-39326 |
8.8 (3.1)
|
ChurchCRM has a Blind SQL injection in PropertyTypeEdi… |
ChurchCRM |
CRM |
2026-04-07T17:30:57.529Z | 2026-04-07T19:59:29.975Z |
| CVE-2026-39329 |
8.8 (3.1)
|
ChurchCRM has a Blind SQL injection in EventNames.php |
ChurchCRM |
CRM |
2026-04-07T17:33:30.119Z | 2026-04-07T19:59:23.647Z |
| CVE-2026-39331 |
8.1 (3.1)
|
ChurchCRM has an API Authorization Bypass Allows Authe… |
ChurchCRM |
CRM |
2026-04-07T17:36:41.987Z | 2026-04-07T18:39:56.463Z |
| CVE-2026-39332 |
8.7 (3.1)
|
ChurchCRM has Reflected Cross-Site Scripting (XSS) in … |
ChurchCRM |
CRM |
2026-04-07T17:37:23.574Z | 2026-04-08T14:41:01.071Z |
| CVE-2026-39333 |
8.7 (3.1)
|
ChurchCRM has Reflected XSS in DateStart/DateEnd param… |
ChurchCRM |
CRM |
2026-04-07T17:38:02.576Z | 2026-04-07T19:59:17.229Z |
| CVE-2026-39334 |
8.8 (3.1)
|
ChurchCRM has a Blind SQL injection in SettingsIndivid… |
ChurchCRM |
CRM |
2026-04-07T17:38:45.436Z | 2026-04-07T18:08:28.055Z |
| CVE-2026-39336 |
6.1 (3.1)
|
ChurchCRM has Stored XSS from unescaped config values … |
ChurchCRM |
CRM |
2026-04-07T17:40:55.153Z | 2026-04-07T18:40:33.123Z |
| CVE-2026-39337 |
10 (3.1)
|
ChurchCRM Affected by Unauthenticated RCE in Install Wizard |
ChurchCRM |
CRM |
2026-04-07T18:08:27.227Z | 2026-04-07T18:41:52.764Z |
| CVE-2026-39319 |
8.8 (3.1)
|
ChurchCRM has a Second Order SQLI via FundRaiserEditor.php |
ChurchCRM |
CRM |
2026-04-07T18:05:18.331Z | 2026-04-08T14:39:12.132Z |
| CVE-2026-39325 |
7.2 (3.1)
|
ChurchCRM has a Blind SQL injection in SettingsUser.php |
ChurchCRM |
CRM |
2026-04-07T17:29:19.882Z | 2026-04-09T15:48:09.561Z |
| CVE-2026-39327 |
8.8 (3.1)
|
ChurchCRM has a SQL injection in MemberRoleChange.php |
ChurchCRM |
CRM |
2026-04-07T17:31:37.384Z | 2026-04-07T18:39:00.851Z |
| CVE-2026-39328 |
8.9 (3.1)
|
ChurchCRM has Stored XSS in Social Profile Fields |
ChurchCRM |
CRM |
2026-04-07T17:32:41.364Z | 2026-04-09T15:50:07.852Z |
| CVE-2026-39330 |
8.8 (3.1)
|
ChurchCRM has a Blind SQL injection in PropertyAssign.php |
ChurchCRM |
CRM |
2026-04-07T17:34:30.429Z | 2026-04-07T18:09:08.271Z |
| CVE-2026-22895 |
2.2 (4.0)
|
QuFTP Service |
QNAP Systems Inc. |
QuFTP Service |
2026-03-20T16:21:40.989Z | 2026-03-25T14:03:29.588Z |
| CVE-2026-24660 |
8.1 (3.1)
|
A heap-based buffer overflow vulnerability exists… |
LibRaw |
LibRaw |
2026-04-07T13:49:25.335Z | 2026-04-08T20:58:58.522Z |
| CVE-2026-24450 |
8.1 (3.1)
|
An integer overflow vulnerability exists in the u… |
LibRaw |
LibRaw |
2026-04-07T13:49:23.872Z | 2026-04-08T03:55:46.772Z |
| CVE-2026-21413 |
9.8 (3.1)
|
A heap-based buffer overflow vulnerability exists… |
LibRaw |
LibRaw |
2026-04-07T13:49:29.784Z | 2026-04-08T03:55:50.134Z |
| CVE-2026-20889 |
9.8 (3.1)
|
A heap-based buffer overflow vulnerability exists… |
LibRaw |
LibRaw |
2026-04-07T13:49:27.912Z | 2026-04-08T03:55:49.049Z |
| CVE-2026-20884 |
8.1 (3.1)
|
An integer overflow vulnerability exists in the d… |
LibRaw |
LibRaw |
2026-04-07T13:49:22.423Z | 2026-04-08T03:55:45.636Z |
| CVE-2026-20911 |
9.8 (3.1)
|
A heap-based buffer overflow vulnerability exists… |
LibRaw |
LibRaw |
2026-04-07T13:49:31.223Z | 2026-04-08T03:55:51.222Z |
| CVE-2026-33186 |
9.1 (3.1)
|
gRPC-Go has an authorization bypass via missing leadin… |
grpc |
grpc-go |
2026-03-20T22:23:32.147Z | 2026-03-24T18:09:13.422Z |
| CVE-2026-23554 |
7.8 (3.1)
|
Use after free of paging structures in EPT |
Xen |
Xen |
2026-03-23T06:56:52.344Z | 2026-03-23T14:19:27.752Z |
| CVE-2026-23555 |
7.1 (3.1)
|
Xenstored DoS by unprivileged domain |
Xen |
Xen |
2026-03-23T06:57:07.653Z | 2026-03-23T14:14:02.810Z |
| CVE-2026-4596 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
projectworlds Lawyer Management System lawyers.php cro… |
projectworlds |
Lawyer Management System |
2026-03-23T19:20:03.984Z | 2026-03-24T18:45:11.073Z |
| CVE-2026-35473 |
5.1 (4.0)
|
WeGIA - Open Redirect - IentradaControle - listarId() … |
LabRedesCefetRJ |
WeGIA |
2026-04-06T21:12:35.894Z | 2026-04-08T14:01:50.893Z |
| CVE-2026-35474 |
5.1 (4.0)
|
WeGIA - Open Redirect - atualizacao redirection - Unva… |
LabRedesCefetRJ |
WeGIA |
2026-04-06T21:13:25.517Z | 2026-04-07T15:59:13.467Z |
| CVE-2026-35475 |
5.1 (4.0)
|
WeGIA - Open Redirect - backup redirection — Unvalidat… |
LabRedesCefetRJ |
WeGIA |
2026-04-06T21:17:04.964Z | 2026-04-07T13:40:11.583Z |
| CVE-2026-40190 |
5.6 (3.1)
|
LangSmith Client SDKs has Prototype Pollution in langs… |
langchain-ai |
langsmith-sdk |
2026-04-10T19:47:57.642Z | 2026-04-10T19:47:57.642Z |
| CVE-2026-40189 |
9.3 (4.0)
|
goshs has a file-based ACL authorization bypass in gos… |
patrickhener |
goshs |
2026-04-10T19:44:54.672Z | 2026-04-10T19:44:54.672Z |
| CVE-2026-40188 |
7.7 (3.1)
|
goshs is Missing Write Protection for Parametric Data Values |
patrickhener |
goshs |
2026-04-10T19:43:45.197Z | 2026-04-10T19:43:45.197Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-33773 | An Incorrect Initialization of Resource vulnerability in the packet forwarding engine (pfe) of Juni… | 2026-04-09T22:16:25.590 | 2026-04-09T22:16:25.590 |
| fkie_cve-2026-33771 | A Weak Password Requirements vulnerability in the password management function of Juniper Networks … | 2026-04-09T22:16:25.430 | 2026-04-09T22:16:25.430 |
| fkie_cve-2026-21919 | An Incorrect Synchronization vulnerability in the management daemon (mgd) of Juniper Networks Junos… | 2026-04-09T22:16:25.173 | 2026-04-09T22:16:25.173 |
| fkie_cve-2026-21916 | A UNIX Symbolic Link (Symlink) Following vulnerability in the CLI of Juniper Networks Junos OS allo… | 2026-04-09T22:16:24.953 | 2026-04-09T22:16:24.953 |
| fkie_cve-2026-21915 | A Permissive List of Allowed Input vulnerability in the CLI of Juniper Networks Support Insights (J… | 2026-04-09T22:16:24.747 | 2026-04-09T22:16:24.747 |
| fkie_cve-2026-21904 | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerabili… | 2026-04-09T22:16:24.557 | 2026-04-09T22:16:24.557 |
| fkie_cve-2025-70797 | Cross Site Scripting vulnerability in Limesurvey v.6.15.20+251021 allows a remote attacker to execu… | 2026-04-09T18:16:42.547 | 2026-04-09T22:16:24.380 |
| fkie_cve-2025-59969 | A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the advan… | 2026-04-09T22:16:24.100 | 2026-04-09T22:16:24.100 |
| fkie_cve-2025-30650 | A Missing Authentication for Critical Function vulnerability in command processing of Juniper Netwo… | 2026-04-08T19:24:00.440 | 2026-04-09T22:16:23.860 |
| fkie_cve-2025-13914 | A Key Exchange without Entity Authentication vulnerability in the SSH implementation of Juniper Net… | 2026-04-09T22:16:22.697 | 2026-04-09T22:16:22.697 |
| fkie_cve-2026-35471 | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return afte… | 2026-04-06T22:16:23.913 | 2026-04-09T21:20:35.993 |
| fkie_cve-2026-35393 | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, the POST multipart upload directo… | 2026-04-06T21:16:21.163 | 2026-04-09T21:20:27.383 |
| fkie_cve-2026-35392 | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in httpserver/updown.g… | 2026-04-06T21:16:21.013 | 2026-04-09T21:20:20.510 |
| fkie_cve-2023-53959 | FileZilla Client 3.63.1 contains a DLL hijacking vulnerability that allows attackers to execute mal… | 2025-12-19T21:15:53.030 | 2026-04-09T21:19:48.913 |
| fkie_cve-2025-14979 | AirVPN Eddie on MacOS contains an insecure XPC service that allows local, unprivileged users to esc… | 2026-01-06T16:15:51.150 | 2026-04-09T21:17:28.367 |
| fkie_cve-2026-5980 | A flaw has been found in D-Link DIR-605L 2.13B01. Affected by this issue is the function formSetMAC… | 2026-04-09T21:16:14.223 | 2026-04-09T21:16:14.223 |
| fkie_cve-2026-5979 | A vulnerability was detected in D-Link DIR-605L 2.13B01. Affected by this vulnerability is the func… | 2026-04-09T21:16:13.967 | 2026-04-09T21:16:13.967 |
| fkie_cve-2026-5978 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected is th… | 2026-04-09T21:16:13.727 | 2026-04-09T21:16:13.727 |
| fkie_cve-2026-5977 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function … | 2026-04-09T21:16:13.487 | 2026-04-09T21:16:13.487 |
| fkie_cve-2026-5447 | Heap buffer overflow in CertFromX509 via AuthorityKeyIdentifier size confusion. A heap buffer overf… | 2026-04-09T21:16:13.150 | 2026-04-09T21:16:13.150 |
| fkie_cve-2026-5446 | In wolfSSL, ARIA-GCM cipher suites used in TLS 1.2 and DTLS 1.2 reuse an identical 12-byte GCM nonc… | 2026-04-09T21:16:12.980 | 2026-04-09T21:16:12.980 |
| fkie_cve-2026-4277 | An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. Add permissi… | 2026-04-07T15:17:46.500 | 2026-04-09T21:16:12.733 |
| fkie_cve-2026-4111 | A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifical… | 2026-03-13T19:55:13.917 | 2026-04-09T21:16:12.467 |
| fkie_cve-2026-40109 | Flux notification-controller is the event forwarder and notification dispatcher for the GitOps Tool… | 2026-04-09T21:16:12.277 | 2026-04-09T21:16:12.277 |
| fkie_cve-2026-40107 | SiYuan is a personal knowledge management system. Prior to 3.6.4, SiYuan configures Mermaid.js with… | 2026-04-09T21:16:12.123 | 2026-04-09T21:16:12.123 |
| fkie_cve-2026-40093 | nimiq-blockchain provides persistent block storage for Nimiq's Rust implementation. In 1.3.0 and ea… | 2026-04-09T21:16:11.937 | 2026-04-09T21:16:11.937 |
| fkie_cve-2026-39631 | Missing Authorization vulnerability in Ronik@UnlimitedWP WPSchoolPress wpschoolpress allows Exploit… | 2026-04-08T09:16:33.610 | 2026-04-09T21:16:11.413 |
| fkie_cve-2026-39629 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in kute… | 2026-04-08T09:16:33.340 | 2026-04-09T21:16:11.233 |
| fkie_cve-2026-39627 | Missing Authorization vulnerability in wproyal Ashe ashe allows Exploiting Incorrectly Configured A… | 2026-04-08T09:16:33.080 | 2026-04-09T21:16:11.047 |
| fkie_cve-2026-39625 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in kute… | 2026-04-08T09:16:32.807 | 2026-04-09T21:16:10.840 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-75hx-xj24-mqrw |
8.2 (3.1)
|
n8n-mcp has unauthenticated session termination and information disclosure in HTTP transport | 2026-04-10T20:59:58Z | 2026-04-10T20:59:58Z |
| ghsa-ffq7-898w-9jc4 |
8.0 (3.1)
|
DotNetNuke.Core has stored cross-site-scripting (XSS) via SVG upload | 2026-04-10T20:42:48Z | 2026-04-10T20:42:48Z |
| ghsa-h3x4-hc5v-v2gm |
5.3 (4.0)
|
OpenClaw: Windows media loaders accepted remote-host file URLs before local path validation | 2026-03-26T19:07:55Z | 2026-04-10T20:42:28Z |
| ghsa-8h8f-7cxm-m38j |
7.6 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw: Windows media loaders accepted remote-host file URLs before local pat… | 2026-04-02T21:32:52Z | 2026-04-10T20:42:21Z |
| ghsa-8fgx-wgvr-pcx8 |
5.3 (3.1)
5.5 (4.0)
|
Zod jsVideoUrlParser vulnerable to ReDoS in util.js | 2026-04-10T00:30:31Z | 2026-04-10T20:34:42Z |
| ghsa-wp29-qmvj-frvp |
7.3 (3.1)
5.5 (4.0)
|
FoundationAgents MetaGPT vulnerable to os command injection via the Terminal.run_command | 2026-04-09T21:31:30Z | 2026-04-10T20:34:27Z |
| ghsa-qw5f-qpq5-ppfg |
7.3 (3.1)
5.5 (4.0)
|
FoundationAgents MetaGPT vulnerable to OS Command Injection in metagpt/utils/common.py | 2026-04-09T21:31:30Z | 2026-04-10T20:27:58Z |
| ghsa-fcc8-4q7h-wvwc |
7.3 (3.1)
6.9 (4.0)
|
FoundationAgents MetaGPT vulnerable to OS Command Injection in metagpt/tools/libs/terminal.py | 2026-04-09T21:31:30Z | 2026-04-10T20:27:33Z |
| ghsa-mf5g-6r6f-ghhm |
6.3 (4.0)
|
OpenClaw: Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force Guessing of Webhook Token | 2026-03-29T15:50:09Z | 2026-04-10T20:25:07Z |
| ghsa-59xc-5v89-r7pr |
4.8 (3.1)
6.3 (4.0)
|
Duplicate Advisory: OpenClaw: Synology Chat Webhook Pre-Auth Rate-Limit Bypass Enables Brute-Force … | 2026-04-10T00:30:30Z | 2026-04-10T20:25:02Z |
| ghsa-qx8j-g322-qj6m |
7.4 (4.0)
|
OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origin redirects | 2026-04-09T17:37:08Z | 2026-04-10T20:24:59Z |
| ghsa-pg8g-f2hf-x82m |
6.5 (3.1)
7.1 (4.0)
|
Duplicate Advisory: OpenClaw: `fetchWithSsrFGuard` replays unsafe request bodies across cross-origi… | 2026-04-09T00:31:59Z | 2026-04-10T20:24:54Z |
| ghsa-3h52-cx59-c456 |
6.9 (4.0)
|
OpenClaw: Feishu webhook reads and parses unauthenticated request bodies before signature validation | 2026-03-29T15:48:58Z | 2026-04-10T20:21:35Z |
| ghsa-8f9r-gr6r-x63q |
5.3 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw: Feishu webhook reads and parses unauthenticated request bodies before… | 2026-04-10T00:30:30Z | 2026-04-10T20:21:21Z |
| ghsa-vfg3-pqpq-93m4 |
5.3 (4.0)
|
OpenClaw: Tlon cite expansion happens before channel and DM authorization is complete | 2026-03-26T21:27:49Z | 2026-04-10T20:20:23Z |
| ghsa-p6j4-wvmc-vx2h |
7.3 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw: Tlon cite expansion happens before channel and DM authorization is complete | 2026-04-10T00:30:30Z | 2026-04-10T20:20:17Z |
| ghsa-hf68-49fm-59cq |
9.4 (4.0)
|
OpenClaw Gateway: RCE and Privilege Escalation from operator.pairing to operator.admin via device.p… | 2026-03-26T21:40:57Z | 2026-04-10T20:20:13Z |
| ghsa-r3v5-2grc-429h |
8.8 (3.1)
8.7 (4.0)
|
Duplicate Advisory: OpenClaw Gateway: RCE and Privilege Escalation from operator.pairing to operato… | 2026-04-10T00:30:30Z | 2026-04-10T20:20:07Z |
| ghsa-rqp8-q22p-5j9q |
6.9 (4.0)
|
OpenClaw Bypasses DM Policy Separation via Synology Chat Webhook Path Collision | 2026-03-26T21:45:35Z | 2026-04-10T20:19:58Z |
| ghsa-g8mc-c5f2-mqg7 |
4.8 (3.1)
6.3 (4.0)
|
Duplicate Advisory: OpenClaw Bypasses DM Policy Separation via Synology Chat Webhook Path Collision | 2026-04-10T00:30:30Z | 2026-04-10T20:19:52Z |
| ghsa-6mqc-jqh6-x8fc |
6.9 (4.0)
|
OpenClaw: Gateway Canvas local-direct requests bypass Canvas HTTP and WebSocket authentication | 2026-03-26T18:59:00Z | 2026-04-10T20:19:48Z |
| ghsa-9gvx-vj57-vqqx |
5.1 (3.1)
5.1 (4.0)
|
Duplicate Advisory: OpenClaw: Gateway Canvas local-direct requests bypass Canvas HTTP and WebSocket… | 2026-04-10T00:30:30Z | 2026-04-10T20:19:41Z |
| ghsa-4qwc-c7g9-4xcw |
8.2 (4.0)
|
OpenClaw: Remote media error responses could trigger unbounded memory allocation before failure | 2026-03-26T19:50:06Z | 2026-04-10T20:19:35Z |
| ghsa-hm63-vwj4-mj2q |
5.3 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw: Remote media error responses could trigger unbounded memory allocatio… | 2026-04-10T00:30:30Z | 2026-04-10T20:19:29Z |
| ghsa-rhfg-j8jq-7v2h |
|
OpenClaw: SSRF via Unguarded Configured Base URLs in Multiple Channel Extensions (Incomplete Fix fo… | 2026-03-29T15:48:42Z | 2026-04-10T20:19:25Z |
| ghsa-8j7f-g9gv-7jhc |
7.4 (3.1)
5.3 (4.0)
|
Duplicate Advisory: OpenClaw: SSRF via Unguarded Configured Base URLs in Multiple Channel Extension… | 2026-04-10T00:30:30Z | 2026-04-10T20:19:19Z |
| ghsa-65h8-27jh-q8wv |
8.6 (4.0)
|
OpenClaw: Nostr inbound DMs could trigger unauthenticated crypto work before sender policy enforcement | 2026-03-26T19:08:34Z | 2026-04-10T20:19:14Z |
| ghsa-2j53-2c28-g9v2 |
6.5 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw: Nostr inbound DMs could trigger unauthenticated crypto work before se… | 2026-04-10T00:30:30Z | 2026-04-10T20:19:08Z |
| ghsa-rm59-992w-x2mv |
6.6 (4.0)
|
OpenClaw is vulnerable to unauthenticated resource exhaustion through its voice call webhook handling | 2026-03-26T19:50:41Z | 2026-04-10T20:19:04Z |
| ghsa-36cp-mh65-x882 |
5.3 (3.1)
6.9 (4.0)
|
Duplicate Advisory: OpenClaw is vulnerable to unauthenticated resource exhaustion through its voice… | 2026-04-10T00:30:30Z | 2026-04-10T20:18:58Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-174 |
4.3 (3.1)
|
Server-Side Request Forgery (SSRF) vulnerability in Apache StreamPipes during installatio… | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.678475+00:00 |
| pysec-2024-173 |
8.8 (3.1)
|
Unrestricted Upload of File with dangerous type vulnerability in Apache StreamPipes. Such… | streampipes | 2024-07-17T10:15:01+00:00 | 2025-01-18T22:21:43.618882+00:00 |
| pysec-2024-172 |
3.7 (3.1)
|
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache StreamPipes in … | streampipes | 2024-07-17T09:15:02+00:00 | 2025-01-18T22:21:43.557516+00:00 |
| pysec-2024-171 |
8.0 (3.1)
|
Strawberry GraphQL is a library for creating GraphQL APIs. Prior to version 0.243.0, mult… | strawberry-graphql | 2024-09-25T18:15:05+00:00 | 2025-01-18T22:21:43.412172+00:00 |
| pysec-2024-170 |
4.8 (3.1)
|
A stored Cross-Site Scripting (XSS) vulnerability was identified in the zenml-io/zenml re… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.253212+00:00 |
| pysec-2024-169 |
6.5 (3.1)
|
An improper authorization vulnerability exists in the zenml-io/zenml repository, specific… | zenml | 2024-06-06T19:15:53+00:00 | 2025-01-18T19:19:08.205431+00:00 |
| pysec-2024-168 |
6.5 (3.1)
|
Taipy is an open-source Python library for easy, end-to-end application development for d… | taipy | 2024-10-09T19:15:14+00:00 | 2025-01-18T19:19:07.718423+00:00 |
| pysec-2024-167 |
|
NLTK through 3.8.1 allows remote code execution if untrusted packages have pickled Python… | nltk | 2024-06-27T22:15:10+00:00 | 2025-01-18T19:19:06.317325+00:00 |
| pysec-2024-166 |
|
Nautobot is a Network Source of Truth and Network Automation Platform. A user with permis… | nautobot | 2024-05-28T23:15:17+00:00 | 2025-01-18T19:19:06.277166+00:00 |
| pysec-2024-165 |
7.5 (3.1)
|
The Jupyter Server provides the backend for Jupyter web applications. Jupyter Server on W… | jupyter-server | 2024-06-06T16:15:11+00:00 | 2025-01-18T19:19:04.842426+00:00 |
| pysec-2024-164 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an exces… | vyper | 2024-02-26T20:19:05+00:00 | 2025-01-16T21:21:41.436934+00:00 |
| pysec-2025-1 |
|
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2… | django | 2025-01-14T19:15:32+00:00 | 2025-01-14T21:22:18.665005+00:00 |
| pysec-2024-163 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to ve… | vyper | 2024-04-25T18:15:09+00:00 | 2025-01-14T05:22:23.036505+00:00 |
| pysec-2024-162 |
6.5 (3.1)
|
A Regular Expression Denial of Service (ReDoS) vulnerability exists in the XMLFeedSpider … | scrapy | 2024-02-28T00:15:53+00:00 | 2025-01-14T05:22:21.870348+00:00 |
| pysec-2024-161 |
|
Deserialization of untrusted data in IPC and Parquet readers in the Apache Arrow R packag… | pyarrow | 2024-11-28T17:15:48+00:00 | 2025-01-14T05:22:20.554292+00:00 |
| pysec-2024-160 |
6.1 (3.1)
|
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.cle… | lxml-html-clean | 2024-11-19T22:15:21+00:00 | 2025-01-14T05:22:17.244267+00:00 |
| pysec-2024-159 |
|
Versions of the package luigi before 3.6.0 are vulnerable to Arbitrary File Write via Arc… | luigi | 2024-12-10T05:15:07+00:00 | 2025-01-14T05:22:17.204098+00:00 |
| pysec-2024-158 |
|
Versions of the package djoser before 2.3.0 are vulnerable to Authentication Bypass when … | djoser | 2024-12-13T05:15:07+00:00 | 2025-01-14T05:22:11.856636+00:00 |
| pysec-2024-157 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:18+00:00 | 2025-01-14T05:22:11.817473+00:00 |
| pysec-2024-156 |
|
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2… | django | 2024-12-06T12:15:17+00:00 | 2025-01-14T05:22:11.736011+00:00 |
| pysec-2024-155 |
7.5 (3.1)
|
cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) … | cbor2 | 2024-02-19T23:15:07+00:00 | 2025-01-14T05:22:09.226388+00:00 |
| pysec-2019-255 |
6.1 (3.1)
|
data/interfaces/default/history.html in Tautulli 2.1.26 has XSS via a crafted Plex userna… | tautulli | 2019-02-19T16:29:00Z | 2025-01-12T05:34:20.550037Z |
| pysec-2019-254 |
6.5 (3.1)
|
In Tautulli 2.1.9, CSRF in the /shutdown URI allows an attacker to shut down the remote m… | tautulli | 2019-12-18T18:15:00Z | 2025-01-12T05:34:20.505254Z |
| pysec-2022-43131 |
6.5 (3.1)
|
diplib v3.0.0 is vulnerable to Double Free. | diplib | 2022-11-04T17:15:00Z | 2024-12-27T22:48:17.996707Z |
| pysec-2022-43162 |
7.5 (3.1)
|
Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID. | redis | 2022-06-23T17:15:00Z | 2024-12-23T11:33:23.546447Z |
| pysec-2019-253 |
7.4 (3.1)
|
Tahoe-LAFS 1.9.0 fails to ensure integrity which allows remote attackers to corrupt mutab… | tahoe-lafs | 2019-11-07T18:15:00Z | 2024-12-19T05:47:49.035329Z |
| pysec-2020-343 |
7.8 (3.1)
|
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when the… | blosc2 | 2020-11-27T20:15:00Z | 2024-12-12T14:22:45.450508Z |
| pysec-2024-154 |
8.6 (3.1)
8.7 (4.0)
|
Ultralytics has identified a supply chain attack affecting affecting multiple versions of… | ultralytics | 2024-12-10T19:20:27.097505+00:00 | |
| pysec-2015-42 |
|
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.… | ipsilon | 2015-11-17T15:59:00Z | 2024-12-05T09:35:27.751929Z |
| pysec-2015-41 |
|
providers/saml2/admin.py in the Identity Provider (IdP) server in Ipsilon 0.1.0 before 1.… | ipsilon | 2015-11-17T15:59:00Z | 2024-12-05T09:35:27.711043Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33739 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.344696Z |
| gsd-2024-33738 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.562140Z |
| gsd-2024-33737 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.285475Z |
| gsd-2024-33736 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.346507Z |
| gsd-2024-33735 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.410261Z |
| gsd-2024-33734 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.482444Z |
| gsd-2024-33733 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.577869Z |
| gsd-2024-33732 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.513959Z |
| gsd-2024-33731 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.328794Z |
| gsd-2024-33730 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.396940Z |
| gsd-2024-33729 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.527542Z |
| gsd-2024-33728 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.380564Z |
| gsd-2024-33727 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.514916Z |
| gsd-2024-33726 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.327193Z |
| gsd-2024-33725 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.300660Z |
| gsd-2024-33724 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429383Z |
| gsd-2024-33723 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.361754Z |
| gsd-2024-33722 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.598142Z |
| gsd-2024-33721 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.408369Z |
| gsd-2024-33720 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.519711Z |
| gsd-2024-33719 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.344333Z |
| gsd-2024-33718 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.360853Z |
| gsd-2024-33717 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.429699Z |
| gsd-2024-33716 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.371227Z |
| gsd-2024-33715 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.440563Z |
| gsd-2024-33714 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.510684Z |
| gsd-2024-33713 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.522989Z |
| gsd-2024-33712 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.587066Z |
| gsd-2024-33711 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.452695Z |
| gsd-2024-33710 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.499457Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-2324 | Malicious code in jellyfi-pino-pretty-logger (npm) | 2026-04-01T09:10:18Z | 2026-04-07T14:41:22Z |
| mal-2026-2498 | Malicious code in df-sandbox-test (npm) | 2026-04-06T09:18:00Z | 2026-04-07T14:41:21Z |
| mal-2026-2497 | Malicious code in commerce-utils (npm) | 2026-04-06T09:11:24Z | 2026-04-07T14:41:21Z |
| mal-2026-2496 | Malicious code in chess-sec-ssrf1 (npm) | 2026-04-06T06:10:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2495 | Malicious code in cloudera (npm) | 2026-04-05T20:05:37Z | 2026-04-07T14:41:21Z |
| mal-2026-2493 | Malicious code in cloudera-poc (npm) | 2026-04-05T19:40:31Z | 2026-04-07T14:41:21Z |
| mal-2026-2444 | Malicious code in exszpe3szs (npm) | 2026-04-02T15:12:47Z | 2026-04-07T14:41:21Z |
| mal-2026-2443 | Malicious code in exprrrress (npm) | 2026-04-02T18:21:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2442 | Malicious code in expreeeess (npm) | 2026-04-02T18:11:34Z | 2026-04-07T14:41:21Z |
| mal-2026-2441 | Malicious code in expirs (npm) | 2026-04-02T15:13:53Z | 2026-04-07T14:41:21Z |
| mal-2026-2440 | Malicious code in experedzss (npm) | 2026-04-02T15:11:56Z | 2026-04-07T14:41:21Z |
| mal-2026-2439 | Malicious code in expeewas (npm) | 2026-04-02T15:22:21Z | 2026-04-07T14:41:21Z |
| mal-2026-2438 | Malicious code in expeedsxs (npm) | 2026-04-02T15:12:22Z | 2026-04-07T14:41:21Z |
| mal-2026-2437 | Malicious code in exaprse (npm) | 2026-04-02T15:12:58Z | 2026-04-07T14:41:21Z |
| mal-2026-2436 | Malicious code in eixp4ressz (npm) | 2026-04-02T15:12:04Z | 2026-04-07T14:41:21Z |
| mal-2026-2419 | Malicious code in express-session-js (npm) | 2026-04-02T09:56:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2365 | Malicious code in env-nodejs (npm) | 2026-03-24T15:44:15Z | 2026-04-07T14:41:21Z |
| mal-2026-2364 | Malicious code in env-node-cli (npm) | 2026-03-24T15:44:15Z | 2026-04-07T14:41:21Z |
| mal-2026-2363 | Malicious code in env-extend (npm) | 2026-03-24T15:44:14Z | 2026-04-07T14:41:21Z |
| mal-2026-2362 | Malicious code in env-express-cli (npm) | 2026-03-24T15:44:13Z | 2026-04-07T14:41:21Z |
| mal-2026-2361 | Malicious code in env-express (npm) | 2026-03-24T15:44:12Z | 2026-04-07T14:41:21Z |
| mal-2026-2360 | Malicious code in env-expanded (npm) | 2026-03-24T15:44:12Z | 2026-04-07T14:41:21Z |
| mal-2026-2359 | Malicious code in env-embed (npm) | 2026-03-24T15:44:11Z | 2026-04-07T14:41:21Z |
| mal-2026-2358 | Malicious code in env-cli-express (npm) | 2026-03-24T15:44:10Z | 2026-04-07T14:41:21Z |
| mal-2026-2357 | Malicious code in ectoplast-spirit (npm) | 2026-03-24T15:43:46Z | 2026-04-07T14:41:21Z |
| mal-2026-2356 | Malicious code in ecto-spirit-core (npm) | 2026-03-24T15:43:45Z | 2026-04-07T14:41:21Z |
| mal-2026-2355 | Malicious code in ecto-spirit (npm) | 2026-03-24T15:43:45Z | 2026-04-07T14:41:21Z |
| mal-2026-2354 | Malicious code in ecto-registry (npm) | 2026-03-24T15:43:44Z | 2026-04-07T14:41:21Z |
| mal-2026-2353 | Malicious code in ecto-engine (npm) | 2026-03-24T15:43:43Z | 2026-04-07T14:41:21Z |
| mal-2026-2352 | Malicious code in ecto-corsair-lwirz (npm) | 2026-03-24T15:43:43Z | 2026-04-07T14:41:21Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0764 | Grafana Tempo: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0760 | Xen und Citrix Systems XenServer: Mehrere Schwachstellen | 2026-03-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0734 | GNU InetUtils: Mehrere Schwachstellen | 2026-03-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0720 | systemd: Mehrere Schwachstellen | 2026-03-12T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0704 | Google Cloud Platform Envoy Proxy, Istio und Service Mesh: Mehrere Schwachstellen | 2026-03-11T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0607 | CPython: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0599 | Drupal Extensions: Mehrere Schwachstellen | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0595 | Ruby: Schwachstelle ermöglicht Denial of Service | 2026-03-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0556 | vim: Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0508 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2026-02-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0504 | Mattermost Server und Plugins: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-24T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0446 | libssh: Mehrere Schwachstellen ermöglichen Manipulation von Dateien und DoS | 2026-02-17T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0419 | vim (NetBeans): Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0369 | Microsoft Windows: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0361 | GIMP: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0342 | GIMP: Schwachstelle ermöglicht Denial of Service | 2026-02-08T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0318 | n8n: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0297 | Django: Mehrere Schwachstellen | 2026-02-03T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0209 | Cpython: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0207 | Red Hat Enterprise Linux (urllib3): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-01-25T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0183 | InetUtils (telnetd): Schwachstelle ermöglicht Erlangen von Administratorrechten | 2026-01-20T23:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2026-0861 | Linux Kernel: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0858 | NATS Server: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0855 | Xen: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0854 | Squid: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0851 | IBM InfoSphere Information Server: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0847 | GitLab: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0845 | IBM WebSphere Application Server Liberty: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0844 | Hitachi Ops Center: Mehrere Schwachstellen | 2026-03-24T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| wid-sec-w-2026-0826 | Znuny: Schwachstelle ermöglicht Cross-Site Scripting | 2026-03-23T23:00:00.000+00:00 | 2026-03-25T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-193-02 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:11.677616Z |
| icsa-24-074-11 | Siemens RUGGEDCOM APE1808 with Fortigate NGFW Devices | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:10.660779Z |
| icsa-24-193-11 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:09.701376Z |
| icsa-26-015-09 | Siemens Industrial Edge Device Kit | 2026-01-13T00:00:00.000000Z | 2026-01-14T21:54:58.722065Z |
| icsa-26-013-03 | YoSmart YoLink Smart Hub | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-02 | Rockwell Automation FactoryTalk DataMosaix Private Cloud | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-26-013-01 | Rockwell Automation 432ES-IG3 Series A | 2026-01-13T07:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| icsa-25-212-01 | Güralp Systems FMUS Series and MIN Series Devices (Update B) | 2025-07-31T06:00:00.000000Z | 2026-01-13T07:00:00.000000Z |
| va-26-013-01 | NSecKrnl driver terminates system processes with crafted IOCTL requests | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| icsa-25-345-03 | AzeoTech DAQFactory (Update A) | 2025-12-11T07:00:00.000000Z | 2026-01-12T07:00:00.000000Z |
| va-26-008-01 | OPEXUS eCASE | 2026-01-08T16:36:15Z | 2026-01-08T16:36:15Z |
| va-26-008-03 | Ideagen DevonWay stored XSS | 2026-01-08T00:00:00Z | 2026-01-08T00:00:00Z |
| icsa-26-008-01 | Hitachi Energy Asset Suite | 2025-12-09T00:00:00.000000Z | 2026-01-07T21:26:16.381953Z |
| va-26-008-02 | OPEXUS eComplaint and eCasePortal IDOR | 2026-01-07T16:35:11Z | 2026-01-07T16:35:11Z |
| icsa-26-006-01 | Columbia Weather Systems MicroServer | 2026-01-06T07:00:00.000000Z | 2026-01-06T07:00:00.000000Z |
| icsa-25-177-01 | Mitsubishi Electric Air Conditioning Systems (Update B) | 2025-06-26T06:00:00.000000Z | 2025-12-23T07:00:00.000000Z |
| icsa-25-352-02 | Schneider Electric EcoStruxure Foxboro DCS Advisor | 2025-12-09T08:00:00.000000Z | 2025-12-18T18:23:06.311869Z |
| icsa-25-352-05 | Siemens Interniche IP-Stack | 2025-12-09T00:00:00.000000Z | 2025-12-18T18:13:59.515670Z |
| icsa-25-352-07 | Rockwell Automation Micro820, Micro850, Micro870 | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-06 | Advantech WebAccess/SCADA | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electrics Products | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-03 | National Instruments LabView | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-25-352-01 | Inductive Automation Ignition | 2025-12-18T07:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| icsa-24-291-03 | Mitsubishi Electric CNC Series (Update C) | 2024-10-17T06:00:00.000000Z | 2025-12-18T07:00:00.000000Z |
| va-25-352-01 | BullWall Ransomware Containment and Server Intrusion Protection multiple vulnerabilities | 2025-12-18T00:00:00Z | 2025-12-18T00:00:00Z |
| icsa-25-350-04 | Mitsubishi Electric GT Designer3 | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-350-03 | Hitachi Energy AFS, AFR and AFF Series | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-350-01 | Güralp Systems Fortimus Series, Minimus Series, and Certimus Series | 2025-12-16T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-308-01 | Fuji Electric Monitouch V-SFT-6 (Update A) | 2025-11-04T07:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-224-02 | Johnson Controls iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2 (Update A) | 2025-08-12T06:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-meraki-mx-vpn-dos-qtrhzg2 | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:28+00:00 |
| cisco-sa-meraki-mx-vpn-dos-by-qwukqv7x | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:27+00:00 |
| cisco-sa-webex-xss-7teqtfn8 | Cisco Webex Services Cross-Site Scripting Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-webex-cache-q4xbkqbg | Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-ssti-dpulqsmz | Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sna-apiacv-4b6x5ysw | Cisco Secure Network Analytics Manager API Authorization Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-ise-restart-ss-uf986g2q | Cisco Identity Services Engine RADIUS Denial of Service Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-duo-ssp-cmd-inj-rcmyrna | Cisco Duo Self-Service Portal Command Injection Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cuis-priv-esc-3pk96su4 | Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-cucm-kkhzbhr5 | Cisco Unified Communications Products Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-contcent-insuffacces-ardovhn8 | Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
| cisco-sa-sdwanarbfile-2zkhkzwj | Cisco Catalyst SD-WAN Manager Arbitrary File Creation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-14T20:04:53+00:00 |
| cisco-sa-sdwan-fileoverwrite-uc9txwh | Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-08T15:55:57+00:00 |
| cisco-sa-wlc-wncd-p6gvt6hl | Cisco IOS XE Software for WLC Wireless IPv6 Clients Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-multi-arnhm4v6 | Cisco IOS XE Software Web-Based Management Interface Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-webui-cmdinj-gvn3oknc | Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-xss-xhn8m5jt | Cisco Catalyst SD-WAN Manager Stored Cross-Site Scripting Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-vmanage-html-inj-gxvtk6zj | Cisco Catalyst SD-WAN Manager Reflected HTML Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-twamp-kv4fhugn | Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-snmpv3-qkeyvzsy | Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sisf-dos-zgwt4ddy | Multiple Cisco Products Switch Integrated Security Features DHCPv6 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-sdwan-priviesc-wck7bmmt | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-netconf-nacm-bypass-tgzv9pmq | Cisco IOS XE Software Model-Driven Programmability Authorization Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-multiprod-ikev2-dos-gpctuqv2 | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IKEv2 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ipsgacl-pg6qfzk | Cisco IOS Software on Cisco Catalyst 1000 and 2960L Switches Access Control List Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iox-dos-95fqnf7b | Cisco IOx Application Hosting Environment Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-privesc-su7scvdp | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-ikev1-dos-xhk3hzfc | Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-iosxe-dhcpsn-dos-xbn8mtks | Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| cisco-sa-ios-http-privesc-wcrd5e3 | Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-36949 | amd/amdkfd: sync all devices to wait all processes being evicted | 2024-05-02T07:00:00.000Z | 2026-03-31T15:17:37.000Z |
| msrc_cve-2024-50243 | fs/ntfs3: Fix general protection fault in run_is_mapped_full | 2024-11-02T00:00:00.000Z | 2026-03-31T15:17:36.000Z |
| msrc_cve-2024-57895 | ksmbd: set ATTR_CTIME flags when setting mtime | 2025-01-02T00:00:00.000Z | 2026-03-31T15:17:35.000Z |
| msrc_cve-2024-36024 | drm/amd/display: Disable idle reallow as part of command/gpint execution | 2024-05-02T07:00:00.000Z | 2026-03-31T15:17:33.000Z |
| msrc_cve-2024-46860 | wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change | 2024-09-01T07:00:00.000Z | 2026-03-31T15:17:26.000Z |
| msrc_cve-2024-36922 | wifi: iwlwifi: read txq->read_ptr under lock | 2024-05-02T07:00:00.000Z | 2026-03-31T15:17:21.000Z |
| msrc_cve-2024-49885 | mm, slub: avoid zeroing kmalloc redzone | 2024-10-01T07:00:00.000Z | 2026-03-31T15:17:19.000Z |
| msrc_cve-2024-56692 | f2fs: fix to do sanity check on node blkaddr in truncate_node() | 2024-12-02T00:00:00.000Z | 2026-03-31T15:17:18.000Z |
| msrc_cve-2024-26914 | drm/amd/display: fix incorrect mpc_combine array size | 2024-04-02T07:00:00.000Z | 2026-03-31T15:17:17.000Z |
| msrc_cve-2026-33055 | tar-rs incorrectly ignores PAX size headers if header size is nonzero | 2026-03-02T00:00:00.000Z | 2026-03-31T15:17:14.000Z |
| msrc_cve-2024-36244 | net/sched: taprio: extend minimum interval restriction to entire cycle too | 2024-06-02T07:00:00.000Z | 2026-03-31T15:17:07.000Z |
| msrc_cve-2023-52582 | netfs: Only call folio_start_fscache() one time for each folio | 2024-03-02T08:00:00.000Z | 2026-03-31T15:17:06.000Z |
| msrc_cve-2024-49932 | btrfs: don't readahead the relocation inode on RST | 2024-10-01T07:00:00.000Z | 2026-03-31T15:17:05.000Z |
| msrc_cve-2025-23131 | dlm: prevent NPD when writing a positive value to event_done | 2025-04-02T00:00:00.000Z | 2026-03-31T15:17:03.000Z |
| msrc_cve-2025-68223 | drm/radeon: delete radeon_fence_process in is_signaled, no deadlock | 2025-12-02T00:00:00.000Z | 2026-03-31T15:16:57.000Z |
| msrc_cve-2025-39905 | net: phylink: add lock for serializing concurrent pl->phydev writes with resolver | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:52.000Z |
| msrc_cve-2023-52569 | btrfs: remove BUG() after failure to insert delayed dir index item | 2024-03-02T08:00:00.000Z | 2026-03-31T15:16:52.000Z |
| msrc_cve-2024-46806 | drm/amdgpu: Fix the warning division or modulo by zero | 2024-09-01T07:00:00.000Z | 2026-03-31T15:16:51.000Z |
| msrc_cve-2025-40251 | devlink: rate: Unset parent pointer in devl_rate_nodes_destroy | 2025-12-02T00:00:00.000Z | 2026-03-31T15:16:43.000Z |
| msrc_cve-2025-40325 | md/raid10: wait barrier before returning discard request with REQ_NOWAIT | 2025-04-02T00:00:00.000Z | 2026-03-31T15:16:42.000Z |
| msrc_cve-2024-49940 | l2tp: prevent possible tunnel refcount underflow | 2024-10-01T07:00:00.000Z | 2026-03-31T15:16:41.000Z |
| msrc_cve-2024-54683 | netfilter: IDLETIMER: Fix for possible ABBA deadlock | 2025-01-02T00:00:00.000Z | 2026-03-31T15:16:39.000Z |
| msrc_cve-2024-46835 | drm/amdgpu: Fix smatch static checker warning | 2024-09-01T07:00:00.000Z | 2026-03-31T15:16:36.000Z |
| msrc_cve-2025-39901 | i40e: remove read access to debugfs files | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:28.000Z |
| msrc_cve-2025-40039 | ksmbd: Fix race condition in RPC handle list access | 2025-10-02T00:00:00.000Z | 2026-03-31T15:16:27.000Z |
| msrc_cve-2023-52532 | net: mana: Fix TX CQE error handling | 2024-03-02T08:00:00.000Z | 2026-03-31T15:16:23.000Z |
| msrc_cve-2024-46857 | net/mlx5: Fix bridge mode operations when there are no VFs | 2024-09-01T07:00:00.000Z | 2026-03-31T15:16:21.000Z |
| msrc_cve-2026-2646 | Heap buffer overflow in session parsing with wolfSSL_d2i_SSL_SESSION() function | 2026-03-02T00:00:00.000Z | 2026-03-31T15:16:19.000Z |
| msrc_cve-2024-58006 | PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar() | 2025-02-02T00:00:00.000Z | 2026-03-31T15:16:19.000Z |
| msrc_cve-2024-49888 | bpf: Fix a sdiv overflow issue | 2024-10-01T07:00:00.000Z | 2026-03-31T15:16:18.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0339 | Kwetsbaarheden verholpen in Oracle MySQL | 2025-10-23T14:11:30.111892Z | 2025-10-23T14:11:30.111892Z |
| ncsc-2025-0338 | Kwetsbaarheden verholpen in Oracle JD Edwards EnterpriseOne Tools | 2025-10-23T13:53:27.268400Z | 2025-10-23T13:53:27.268400Z |
| ncsc-2025-0337 | Kwetsbaarheden verholpen in Oracle Java | 2025-10-23T13:51:40.686406Z | 2025-10-23T13:51:40.686406Z |
| ncsc-2025-0336 | Kwetsbaarheden verholpen in Oracle Hyperion | 2025-10-23T13:49:44.344049Z | 2025-10-23T13:49:44.344049Z |
| ncsc-2025-0335 | Kwetsbaarheden verholpen in Oracle Analytics | 2025-10-23T13:45:06.747933Z | 2025-10-23T13:45:06.747933Z |
| ncsc-2025-0333 | Kwetsbaarheden verholpen in Oracle Financial Services | 2025-10-23T13:35:32.902231Z | 2025-10-23T13:35:32.902231Z |
| ncsc-2025-0332 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2025-10-23T13:26:49.210414Z | 2025-10-23T13:26:49.210414Z |
| ncsc-2025-0331 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2025-10-23T13:23:20.471568Z | 2025-10-23T13:23:20.471568Z |
| ncsc-2025-0330 | Kwetsbaarheden verholpen in Oracle Communications producten | 2025-10-23T13:20:15.363063Z | 2025-10-23T13:20:15.363063Z |
| ncsc-2025-0329 | Kwetsbaarheden verholpen in Oracle Commerce | 2025-10-23T07:20:51.213314Z | 2025-10-23T07:20:51.213314Z |
| ncsc-2025-0328 | Kwetsbaarheden verholpen in Oracle Database producten | 2025-10-23T07:19:57.652532Z | 2025-10-23T07:19:57.652532Z |
| ncsc-2025-0327 | Kwetsbaarheden verholpen in Zohocorp's ManageEngine | 2025-10-23T07:18:47.274781Z | 2025-10-23T07:18:47.274781Z |
| ncsc-2025-0326 | Kwetsbaarheden verholpen in Moxa’s netwerkbeveiligingsapparaten | 2025-10-20T13:03:34.436477Z | 2025-10-20T13:03:34.436477Z |
| ncsc-2025-0325 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2025-10-20T12:59:06.729067Z | 2025-10-20T12:59:06.729067Z |
| ncsc-2025-0241 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-08-06T12:11:46.234849Z | 2025-10-17T10:44:55.312550Z |
| ncsc-2025-0324 | Kwetsbaarheid verholpen in FortiOS | 2025-10-17T08:42:51.624827Z | 2025-10-17T08:42:51.624827Z |
| ncsc-2025-0296 | Kwetsbaarheid verholpen in WatchGuard Fireware OS | 2025-09-19T13:31:26.392203Z | 2025-10-17T08:19:28.145953Z |
| ncsc-2025-0323 | Kwetsbaarheden verholpen in SAP Producten | 2025-10-17T08:04:54.828451Z | 2025-10-17T08:04:54.828451Z |
| ncsc-2025-0322 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-10-16T06:32:33.597617Z | 2025-10-16T06:32:33.597617Z |
| ncsc-2025-0321 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-10-16T06:27:14.019367Z | 2025-10-16T06:27:14.019367Z |
| ncsc-2025-0320 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-10-16T06:25:05.618348Z | 2025-10-16T06:25:05.618348Z |
| ncsc-2025-0318 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-10-15T06:22:07.027110Z | 2025-10-15T06:22:07.027110Z |
| ncsc-2025-0317 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2025-10-15T06:13:55.126030Z | 2025-10-15T06:13:55.126030Z |
| ncsc-2025-0316 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-10-14T18:52:06.487996Z | 2025-10-14T18:52:06.487996Z |
| ncsc-2025-0315 | Kwetsbaarheden verholpen in Microsoft Office | 2025-10-14T18:38:05.692251Z | 2025-10-14T18:38:05.692251Z |
| ncsc-2025-0314 | Kwetsbaarheden verholpen in Microsoft System Center | 2025-10-14T18:27:56.075338Z | 2025-10-14T18:27:56.075338Z |
| ncsc-2025-0313 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-10-14T18:21:47.576457Z | 2025-10-14T18:21:47.576457Z |
| ncsc-2025-0312 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-10-14T18:16:12.274468Z | 2025-10-14T18:16:12.274468Z |
| ncsc-2025-0311 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-10-14T18:13:41.244373Z | 2025-10-14T18:13:41.244373Z |
| ncsc-2025-0309 | Kwetsbaarheden verholpen in Siemens producten | 2025-10-14T11:22:10.254089Z | 2025-10-14T11:22:10.254089Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10396-1 | openbao-2.5.1-1.1 on GA media | 2026-03-20T00:00:00Z | 2026-03-20T00:00:00Z |
| opensuse-su-2026:20402-1 | Security update for gstreamer-plugins-ugly | 2026-03-19T13:48:14Z | 2026-03-19T13:48:14Z |
| opensuse-su-2026:20401-1 | Security update for ucode-intel | 2026-03-19T09:31:38Z | 2026-03-19T09:31:38Z |
| opensuse-su-2026:20399-1 | Security update for libsodium | 2026-03-19T08:18:59Z | 2026-03-19T08:18:59Z |
| opensuse-su-2026:20398-1 | Security update for keylime | 2026-03-19T08:16:55Z | 2026-03-19T08:16:55Z |
| opensuse-su-2026:20397-1 | Security update for poppler | 2026-03-19T08:11:15Z | 2026-03-19T08:11:15Z |
| opensuse-su-2026:20396-1 | Security update for librsvg | 2026-03-19T08:11:15Z | 2026-03-19T08:11:15Z |
| opensuse-su-2026:10395-1 | qemu-10.2.2-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10394-1 | python313-3.13.12-2.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10393-1 | python311-pyasn1-0.6.3-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10392-1 | python311-pyOpenSSL-26.0.0-1.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:10391-1 | GraphicsMagick-1.3.46-3.1 on GA media | 2026-03-19T00:00:00Z | 2026-03-19T00:00:00Z |
| opensuse-su-2026:20394-1 | Security update for mumble | 2026-03-18T20:03:58Z | 2026-03-18T20:03:58Z |
| opensuse-su-2026:20390-1 | Security update for protobuf | 2026-03-18T18:15:53Z | 2026-03-18T18:15:53Z |
| opensuse-su-2026:20392-1 | Security update for python-Authlib | 2026-03-18T17:30:06Z | 2026-03-18T17:30:06Z |
| opensuse-su-2026:20393-1 | Security update for python-simpleeval | 2026-03-18T17:29:11Z | 2026-03-18T17:29:11Z |
| opensuse-su-2026:20388-1 | Security update for postgresql17 | 2026-03-18T15:31:19Z | 2026-03-18T15:31:19Z |
| opensuse-su-2026:20387-1 | Security update for busybox | 2026-03-18T15:29:19Z | 2026-03-18T15:29:19Z |
| opensuse-su-2026:20391-1 | Security update for MozillaThunderbird | 2026-03-18T13:37:38Z | 2026-03-18T13:37:38Z |
| opensuse-su-2026:20386-1 | Security update for cosign | 2026-03-18T11:29:30Z | 2026-03-18T11:29:30Z |
| opensuse-su-2026:20385-1 | Security update for libjxl | 2026-03-18T10:13:37Z | 2026-03-18T10:13:37Z |
| opensuse-su-2026:20384-1 | Security update for libsoup | 2026-03-18T10:01:12Z | 2026-03-18T10:01:12Z |
| opensuse-su-2026:20383-1 | Security update for net-snmp | 2026-03-18T09:56:31Z | 2026-03-18T09:56:31Z |
| opensuse-su-2026:20131-1 | Security update for postgresql17 and postgresql18 | 2026-03-18T08:31:44Z | 2026-03-18T08:31:44Z |
| opensuse-su-2026:10390-1 | tempo-cli-2.10.3-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10389-1 | python311-salt-3006.0-56.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10388-1 | mumble-1.5.857-2.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10387-1 | kernel-devel-6.19.8-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:10386-1 | ImageMagick-7.1.2.17-1.1 on GA media | 2026-03-18T00:00:00Z | 2026-03-18T00:00:00Z |
| opensuse-su-2026:20380-1 | Security update for snpguest | 2026-03-17T15:51:45Z | 2026-03-17T15:51:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3336 | Red Hat Security Advisory: podman security update | 2026-02-25T11:30:01+00:00 | 2026-04-12T19:59:48+00:00 |
| rhsa-2026:3298 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:32:15+00:00 | 2026-04-12T19:59:48+00:00 |
| rhsa-2026:3297 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:09:30+00:00 | 2026-04-12T19:59:47+00:00 |
| rhsa-2026:3296 | Red Hat Security Advisory: RHTAS - Tech Preview Release Of the Policy Controller Operator | 2026-02-25T08:49:49+00:00 | 2026-04-12T19:59:46+00:00 |
| rhsa-2026:3291 | Red Hat Security Advisory: runc security update | 2026-02-25T07:41:04+00:00 | 2026-04-12T19:59:46+00:00 |
| rhsa-2026:3193 | Red Hat Security Advisory: golang security update | 2026-02-24T12:01:01+00:00 | 2026-04-12T19:59:46+00:00 |
| rhsa-2026:3092 | Red Hat Security Advisory: golang-github-openprinting-ipp-usb security update | 2026-02-23T15:34:28+00:00 | 2026-04-12T19:59:46+00:00 |
| rhsa-2026:2951 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-02-18T14:15:26+00:00 | 2026-04-12T19:59:46+00:00 |
| rhsa-2026:3192 | Red Hat Security Advisory: golang security update | 2026-02-24T12:06:46+00:00 | 2026-04-12T19:59:45+00:00 |
| rhsa-2026:3188 | Red Hat Security Advisory: grafana security update | 2026-02-24T11:39:36+00:00 | 2026-04-12T19:59:45+00:00 |
| rhsa-2026:3187 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-24T11:39:51+00:00 | 2026-04-12T19:59:44+00:00 |
| rhsa-2026:3186 | Red Hat Security Advisory: Red Hat build of Cryostat 4.1.1: new RHEL 9 container image security update | 2026-02-26T02:56:36+00:00 | 2026-04-12T19:59:44+00:00 |
| rhsa-2026:3184 | Red Hat Security Advisory: RHTAS - Tech Preview Release Of the Policy Controller Operator | 2026-02-24T09:58:16+00:00 | 2026-04-12T19:59:43+00:00 |
| rhsa-2026:3108 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 3.1.5 | 2026-02-23T17:24:11+00:00 | 2026-04-12T19:59:43+00:00 |
| rhsa-2026:3089 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.4 release. | 2026-02-23T14:46:08+00:00 | 2026-04-12T19:59:42+00:00 |
| rhsa-2026:3040 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-23T02:14:35+00:00 | 2026-04-12T19:59:42+00:00 |
| rhsa-2026:3035 | Red Hat Security Advisory: grafana-pcp security update | 2026-02-23T01:30:21+00:00 | 2026-04-12T19:59:42+00:00 |
| rhsa-2026:2975 | Red Hat Security Advisory: OpenShift Container Platform 4.18.34 packages and security update | 2026-02-25T14:43:11+00:00 | 2026-04-12T19:59:42+00:00 |
| rhsa-2026:2926 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:44:41+00:00 | 2026-04-12T19:59:41+00:00 |
| rhsa-2026:2925 | Red Hat Security Advisory: RHTAS 1.2.2 - Red Hat Trusted Artifact Signer Release | 2026-02-18T12:44:08+00:00 | 2026-04-12T19:59:41+00:00 |
| rhsa-2026:2920 | Red Hat Security Advisory: grafana security update | 2026-02-18T12:55:46+00:00 | 2026-04-12T19:59:40+00:00 |
| rhsa-2026:2914 | Red Hat Security Advisory: grafana security update | 2026-02-18T11:31:17+00:00 | 2026-04-12T19:59:40+00:00 |
| rhsa-2026:2900 | Red Hat Security Advisory: Network Observability 1.11.0 for OpenShift | 2026-02-18T08:39:41+00:00 | 2026-04-12T19:59:39+00:00 |
| rhsa-2026:2844 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.26.1 Release. | 2026-02-17T18:20:32+00:00 | 2026-04-12T19:59:38+00:00 |
| rhsa-2026:2769 | Red Hat Security Advisory: Red Hat Ceph Storage 7.1 security and bug fix updates | 2026-02-17T00:55:59+00:00 | 2026-04-12T19:59:38+00:00 |
| rhsa-2026:2762 | Red Hat Security Advisory: Red Hat Quay 3.10.18 | 2026-02-16T17:44:31+00:00 | 2026-04-12T19:59:38+00:00 |
| rhsa-2026:2708 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-02-16T10:08:41+00:00 | 2026-04-12T19:59:38+00:00 |
| rhsa-2026:2754 | Red Hat Security Advisory: Red Hat Quay 3.9.18 | 2026-02-16T15:43:51+00:00 | 2026-04-12T19:59:37+00:00 |
| rhsa-2026:2737 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-16T12:56:05+00:00 | 2026-04-12T19:59:36+00:00 |
| rhsa-2026:2711 | Red Hat Security Advisory: Red Hat Ceph Storage 8.1 security and bug fix update | 2026-02-16T10:49:01+00:00 | 2026-04-12T19:59:36+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2022-165-03 | Conext™ Combox | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-165-02 | Geo SCADA Mobile | 2022-06-14T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-067-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2022-03-08T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2021-012-02 | EcoStruxure Power Build - Rapsody | 2021-01-12T08:32:35.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-130-03 | Wiser Smart | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-02 | Saitel DP RTU | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-01 | PowerLogic ION Setup | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2021-313-03 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2021-11-09T06:30:00.000Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-039-04 | spaceLYnk, Wiser For KNX, fellerLYnk | 2022-02-08T20:32:52.000Z | 2022-03-08T20:32:52.000Z |
| sevd-2022-067-03 | Ritto Wiser™ Door | 2022-03-08T10:12:35.000Z | 2022-03-08T10:12:35.000Z |
| sevd-2021-313-04 | Windows Print Spooler embedded in EcoStruxure™ Process Expert | 2021-11-09T08:45:48.000Z | 2022-03-08T08:45:48.000Z |
| sevd-2022-011-03 | Easergy P5 | 2022-01-11T11:05:25.000Z | 2022-03-02T11:05:25.000Z |
| sevd-2022-039-06 | Harmony/Magelis iPC Series HMI, Vijeo Designer and Vijeo Designer Basic | 2022-02-08T23:25:23.000Z | 2022-02-08T23:25:23.000Z |
| sevd-2022-039-03 | Easergy P40 | 2022-02-08T17:58:55.000Z | 2022-02-08T17:58:55.000Z |
| sevd-2022-039-05 | EcoStruxure Geo SCADA Expert | 2022-02-08T17:33:44.000Z | 2022-02-08T17:33:44.000Z |
| sevd-2022-039-02 | EcoStruxure EV Charging Expert | 2022-02-08T12:36:59.000Z | 2022-02-08T12:36:59.000Z |
| sevd-2022-039-01 | IGSS (Interactive Graphical SCADA System) | 2022-02-08T07:29:58.000Z | 2022-02-08T07:29:58.000Z |
| sevd-2022-011-07 | EcoStruxure™ Power Monitoring Expert | 2022-01-11T13:20:28.000Z | 2022-01-11T13:20:28.000Z |
| sevd-2022-011-05 | ConneXium Tofino Firewall and Loadable Security Modules | 2022-01-11T12:53:54.000Z | 2022-01-11T12:53:54.000Z |
| sevd-2022-011-04 | Easergy P3 | 2022-01-11T11:28:56.000Z | 2022-01-11T11:28:56.000Z |
| sevd-2022-011-02 | Easergy T300 | 2022-01-11T10:48:02.000Z | 2022-01-11T10:48:02.000Z |
| sevd-2022-011-01 | Ethernet and Web server on Modicon M340 controller and Communication Modules | 2022-01-11T07:53:07.000Z | 2022-01-11T07:53:07.000Z |
| sevd-2021-348-04 | APC by Schneider Electric Rack PDU | 2021-12-14T00:00:00.000Z | 2021-12-21T00:00:00.000Z |
| sevd-2021-348-02 | EVlink City / Parking / Smart Wallbox Charging Stations | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-01 | IGSS (Interactive Graphical SCADA System) | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-313-07 | Eurotherm GUIcon | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-02 | Schneider Electric Software Update | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-313-01 | SCADAPack 300E Series RTU | 2021-11-09T00:00:00.000Z | 2021-11-09T00:00:00.000Z |
| sevd-2021-285-05 | Conext™ Advisor & Conext™ Control V2 | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| sevd-2021-285-04 | Modicon M218 Logic Controller | 2021-10-12T00:00:00.000Z | 2021-10-12T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-103653 | SSA-103653: Denial-of-Service Vulnerability in Automation License Manager | 2024-09-10T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-047424 | SSA-047424: Code Execution and SQL Injection Vulnerabilities in OZW Web Servers | 2025-05-13T00:00:00Z | 2025-05-13T00:00:00Z |
| ssa-443402 | SSA-443402: Multiple SQL Injection Vulnerabilities in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-395348 | SSA-395348: Improper Handling of Length Parameter Inconsistency Vulnerability in TeleControl Server Basic before V3.1.2.2 | 2025-04-16T00:00:00Z | 2025-04-16T00:00:00Z |
| ssa-913875 | SSA-913875: Frame Aggregation and Fragmentation Vulnerabilities in 802.11 | 2021-07-13T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-817234 | SSA-817234: Multiple Kubernetes Ingress NGINX Controller Vulnerabilities in Insights Hub Private Cloud | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-686975 | SSA-686975: IPU 2022.3 Vulnerabilities in Siemens Industrial Products using Intel CPUs | 2023-02-14T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-672923 | SSA-672923: Out of Bounds Write Vulnerability in Solid Edge | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-525431 | SSA-525431: Privilege Escalation Vulnerabilities in Siemens License Server Before V4.3 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-369369 | SSA-369369: Weak Registry Permission Vulnerability in SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor | 2025-02-11T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-306654 | SSA-306654: Insyde BIOS Vulnerabilities in Siemens Industrial Products | 2022-02-22T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-277137 | SSA-277137: Multiple Vulnerabilities in SIDIS Prime Before V4.0.700 | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-195895 | SSA-195895: User Enumeration Vulnerability in the Webserver of SIMATIC Products | 2025-02-11T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-187636 | SSA-187636: Multiple Vulnerabilities in SENTRON 7KT PAC1260 Data Manager | 2025-04-08T00:00:00Z | 2025-04-08T00:00:00Z |
| ssa-920092 | SSA-920092: Memory Corruption Vulnerability in Simcenter Femap | 2025-03-13T00:00:00Z | 2025-03-13T00:00:00Z |
| ssa-787280 | SSA-787280: Unlocked Bootloader Vulnerability in SINAMICS S200 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-620288 | SSA-620288: Multiple Vulnerabilities (NUCLEUS:13) in Capital Embedded AR Classic | 2021-12-14T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-615740 | SSA-615740: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP3 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-515903 | SSA-515903: Multiple Vulnerabilities in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-507653 | SSA-507653: Improper Access Control Vulnerabilities in Tecnomatix Plant Simulation | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-434032 | SSA-434032: Input Validation Vulnerability in the DHCP Client of Nucleus RTOS | 2019-11-12T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-280834 | SSA-280834: Improper OpenVPN Credential Validation Vulnerability in SCALANCE M-800 and SC-600 Families | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-248289 | SSA-248289: Denial of Service Vulnerabilities in the IPv6 Stack of Nucleus RTOS | 2021-04-13T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-075201 | SSA-075201: Multiple Vulnerabilities in SCALANCE LPE9403 Before V4.0 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-073066 | SSA-073066: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP3 | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-050438 | SSA-050438: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and Tecnomatix Plant Simulation | 2025-03-11T00:00:00Z | 2025-03-11T00:00:00Z |
| ssa-992434 | SSA-992434: Directory Traversal Vulnerability in Third-Party Component in SiPass integrated | 2025-02-17T00:00:00Z | 2025-02-17T00:00:00Z |
| ssa-246355 | SSA-246355: Multiple Vulnerabilities in Tableau Server Component of Opcenter Intelligence | 2025-02-11T00:00:00Z | 2025-02-14T00:00:00Z |
| ssa-769027 | SSA-769027: Multiple Vulnerabilities fixed in SCALANCE W700 IEEE 802.11ax devices before V3.0.0 | 2025-02-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ssa-697140 | SSA-697140: Denial of Service Vulnerability in the TCP Event Service of SCALANCE and RUGGEDCOM Products | 2022-10-11T00:00:00Z | 2025-02-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:1037-1 | Security update for grafana | 2026-03-25T10:31:04Z | 2026-03-25T10:31:04Z |
| suse-su-2026:1030-1 | Security update for salt | 2026-03-25T10:17:20Z | 2026-03-25T10:17:20Z |
| suse-su-2026:1029-1 | Security update for salt | 2026-03-25T10:16:49Z | 2026-03-25T10:16:49Z |
| suse-su-2026:1028-1 | Security update for salt | 2026-03-25T10:16:17Z | 2026-03-25T10:16:17Z |
| suse-su-2026:1027-1 | Security update for salt | 2026-03-25T10:15:43Z | 2026-03-25T10:15:43Z |
| suse-su-2026:1026-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:15:30Z | 2026-03-25T10:15:30Z |
| suse-su-2026:1014-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:12:32Z | 2026-03-25T10:12:32Z |
| suse-su-2026:1013-1 | Security update 5.0.7 for Multi-Linux Manager Client Tools | 2026-03-25T10:11:52Z | 2026-03-25T10:11:52Z |
| suse-su-2026:1012-1 | Security update 5.0.7 for Multi-Linux Manager Salt Bundle | 2026-03-25T10:10:54Z | 2026-03-25T10:10:54Z |
| suse-su-2026:1011-1 | Security update 5.0.7 for Multi-Linux Manager Client Tools | 2026-03-25T10:10:31Z | 2026-03-25T10:10:31Z |
| suse-su-2026:1010-1 | Security update 5.0.7 for Multi-Linux Manager Server | 2026-03-25T10:10:02Z | 2026-03-25T10:10:02Z |
| suse-su-2026:1008-1 | Security update for Prometheus | 2026-03-25T10:07:27Z | 2026-03-25T10:07:27Z |
| suse-su-2026:20932-1 | Security update for ffmpeg-7 | 2026-03-25T09:58:50Z | 2026-03-25T09:58:50Z |
| suse-su-2026:20878-1 | Security update for python-pyasn1 | 2026-03-25T09:44:19Z | 2026-03-25T09:44:19Z |
| suse-su-2026:20868-1 | Security update for capstone | 2026-03-25T09:40:00Z | 2026-03-25T09:40:00Z |
| suse-su-2026:1002-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2026-03-25T09:34:30Z | 2026-03-25T09:34:30Z |
| suse-su-2026:1005-1 | Security update for giflib | 2026-03-25T09:32:48Z | 2026-03-25T09:32:48Z |
| suse-su-2026:1004-1 | Security update for libsoup | 2026-03-25T09:32:40Z | 2026-03-25T09:32:40Z |
| suse-su-2026:20869-1 | Security update for python-PyJWT | 2026-03-25T09:31:26Z | 2026-03-25T09:31:26Z |
| suse-su-2026:1003-1 | Security update for the Linux Kernel | 2026-03-25T09:25:47Z | 2026-03-25T09:25:47Z |
| suse-su-2026:20931-1 | Security update for the Linux Kernel | 2026-03-25T08:48:43Z | 2026-03-25T08:48:43Z |
| suse-su-2026:20838-1 | Security update for the Linux Kernel | 2026-03-25T08:48:43Z | 2026-03-25T08:48:43Z |
| suse-ru-2026:1001-1 | Recommended update for rust1.94 | 2026-03-25T08:36:36Z | 2026-03-25T08:36:36Z |
| suse-su-2026:1000-1 | Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) | 2026-03-25T07:08:02Z | 2026-03-25T07:08:02Z |
| suse-su-2026:20944-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-03-25T06:46:04Z | 2026-03-25T06:46:04Z |
| suse-su-2026:20837-1 | Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16) | 2026-03-25T06:46:04Z | 2026-03-25T06:46:04Z |
| suse-su-2026:20943-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-03-25T05:44:30Z | 2026-03-25T05:44:30Z |
| suse-su-2026:20836-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 16) | 2026-03-25T05:44:30Z | 2026-03-25T05:44:30Z |
| suse-su-2026:20930-1 | Security update for python-pyOpenSSL | 2026-03-25T03:41:42Z | 2026-03-25T03:41:42Z |
| suse-su-2026:20929-1 | Security update for python-pyasn1 | 2026-03-25T03:09:46Z | 2026-03-25T03:09:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:2719 | Important: gnupg2 security update | 2026-02-16T00:00:00Z | 2026-02-18T13:46:37Z |
| alsa-2026:2786 | Moderate: glibc security update | 2026-02-17T00:00:00Z | 2026-02-18T13:44:36Z |
| alsa-2026:2799 | Moderate: php security update | 2026-02-17T00:00:00Z | 2026-02-18T13:30:42Z |
| alsa-2026:2821 | Moderate: kernel-rt security update | 2026-02-17T00:00:00Z | 2026-02-18T13:25:58Z |
| alsa-2026:2707 | Important: gimp security update | 2026-02-16T00:00:00Z | 2026-02-17T10:29:58Z |
| alsa-2026:2709 | Important: golang security update | 2026-02-16T00:00:00Z | 2026-02-17T10:27:57Z |
| alsa-2026:2708 | Important: go-toolset:rhel8 security update | 2026-02-16T00:00:00Z | 2026-02-16T14:22:53Z |
| alsa-2026:2421 | Important: nodejs:22 security update | 2026-02-10T00:00:00Z | 2026-02-13T10:53:31Z |
| alsa-2026:2627 | Moderate: gcc-toolset-14-binutils security update | 2026-02-12T00:00:00Z | 2026-02-13T08:03:55Z |
| alsa-2026:0667 | Important: firefox security update | 2026-01-15T00:00:00Z | 2026-02-12T10:37:47Z |
| alsa-2026:1377 | Moderate: image-builder security update | 2026-01-27T00:00:00Z | 2026-02-12T10:36:07Z |
| alsa-2026:2212 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:34:27Z |
| alsa-2026:2282 | Moderate: kernel security update | 2026-02-09T00:00:00Z | 2026-02-12T10:29:43Z |
| alsa-2026:2420 | Important: nodejs:24 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:19:24Z |
| alsa-2026:2422 | Important: nodejs:20 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:15:50Z |
| alsa-2026:2438 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:14:13Z |
| alsa-2026:2452 | Important: pcs security update | 2026-02-10T00:00:00Z | 2026-02-12T10:12:36Z |
| alsa-2026:2470 | Moderate: php:7.4 security update | 2026-02-10T00:00:00Z | 2026-02-12T10:10:23Z |
| alsa-2026:2419 | Moderate: python3.12 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:30:15Z |
| alsa-2026:2410 | Important: libsoup3 security update | 2026-02-10T00:00:00Z | 2026-02-11T15:26:55Z |
| alsa-2026:2224 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-11T15:22:49Z |
| alsa-2026:2389 | Important: brotli security update | 2026-02-10T00:00:00Z | 2026-02-11T11:06:48Z |
| alsa-2026:2323 | Important: git-lfs security update | 2026-02-09T00:00:00Z | 2026-02-11T11:02:49Z |
| alsa-2026:2216 | Important: libsoup security update | 2026-02-09T00:00:00Z | 2026-02-10T10:37:43Z |
| alsa-2026:2222 | Important: freerdp security update | 2026-02-09T00:00:00Z | 2026-02-10T10:08:14Z |
| alsa-2026:2225 | Critical: keylime security update | 2026-02-09T00:00:00Z | 2026-02-10T10:06:14Z |
| alsa-2026:2230 | Important: fontforge security update | 2026-02-09T00:00:00Z | 2026-02-10T10:04:33Z |
| alsa-2026:2378 | Moderate: kernel-rt security update | 2026-02-10T00:00:00Z | 2026-02-10T09:34:16Z |
| alsa-2026:1852 | Moderate: util-linux security update | 2026-02-03T00:00:00Z | 2026-02-10T08:33:43Z |
| alsa-2026:1903 | Important: fence-agents security update | 2026-02-04T00:00:00Z | 2026-02-10T08:31:08Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2026-112 | Use-of-uninitialized-value in PrintSERPacket | 2026-01-23T00:01:50.403598Z | 2026-01-23T00:01:50.404362Z |
| osv-2026-105 | Use-of-uninitialized-value in pcpp::SSLServerHelloMessage::ServerHelloTLSFingerprint::toString | 2026-01-22T00:08:03.696405Z | 2026-01-22T00:08:03.696709Z |
| osv-2025-1061 | Security exception in org.apache.poi.hssf.record.aggregates.SharedValueManager$SharedFormulaGroup.<ini | 2026-01-18T00:03:40.245475Z | 2026-01-21T14:26:21.135983Z |
| osv-2026-98 | Heap-buffer-overflow in hostname_issubdomain | 2026-01-21T00:16:59.551255Z | 2026-01-21T00:16:59.551548Z |
| osv-2026-87 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2026-01-18T00:18:36.932063Z | 2026-01-20T14:24:38.539978Z |
| osv-2026-91 | Use-after-poison in compress.cc | 2026-01-20T00:09:07.159786Z | 2026-01-20T00:09:07.160128Z |
| osv-2026-86 | Security exception in java.base/java.util.Arrays.copyOfRange | 2026-01-18T00:18:18.214799Z | 2026-01-18T00:18:18.215108Z |
| osv-2026-74 | Heap-buffer-overflow in ___interceptor_strtol | 2026-01-17T00:19:48.575833Z | 2026-01-17T00:19:48.576151Z |
| osv-2023-1129 | UNKNOWN READ in HeifPixelImage::overlay | 2023-11-09T13:00:44.441721Z | 2026-01-16T14:20:00.488466Z |
| osv-2020-2308 | Heap-buffer-overflow in derive_collocated_motion_vectors | 2021-02-10T00:00:17.357392Z | 2026-01-16T14:15:52.974687Z |
| osv-2026-57 | Heap-buffer-overflow in mkv::matroska_segment_c::TrackInit | 2026-01-15T00:19:47.203374Z | 2026-01-15T00:19:47.203695Z |
| osv-2026-55 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-15T00:19:29.465463Z | 2026-01-15T00:19:29.465794Z |
| osv-2026-54 | Heap-use-after-free in _dwarf_exec_frame_instr | 2026-01-15T00:17:17.477757Z | 2026-01-15T00:17:17.478056Z |
| osv-2026-53 | Heap-use-after-free in graph::LigatureSubstFormat1::shrink | 2026-01-15T00:16:26.117926Z | 2026-01-15T00:16:26.118291Z |
| osv-2024-195 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-03-24T00:14:24.746452Z | 2026-01-13T14:21:46.144635Z |
| osv-2024-662 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-07-18T00:06:40.832938Z | 2026-01-13T04:48:14.077313Z |
| osv-2020-786 | UNKNOWN READ in H5T__bit_find | 2020-07-14T05:37:33.311187Z | 2026-01-13T04:47:48.710766Z |
| osv-2024-85 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-02-08T00:13:58.690460Z | 2026-01-13T04:47:29.127821Z |
| osv-2024-680 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-07-26T00:06:29.761307Z | 2026-01-13T04:46:21.094915Z |
| osv-2024-675 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-07-24T00:07:37.523933Z | 2026-01-13T04:45:52.716176Z |
| osv-2024-248 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-04-10T00:06:40.907073Z | 2026-01-13T04:44:52.454141Z |
| osv-2024-239 | Use-of-uninitialized-value in H5G__ent_to_link | 2024-04-06T00:11:00.845086Z | 2026-01-13T04:44:11.568412Z |
| osv-2024-223 | UNKNOWN READ in H5HG_read | 2024-04-01T00:01:29.989664Z | 2026-01-13T04:44:02.988515Z |
| osv-2023-1256 | Heap-buffer-overflow in H5T__bit_copy | 2023-12-03T13:02:43.376076Z | 2026-01-13T04:40:40.198673Z |
| osv-2023-1073 | Heap-buffer-overflow in H5D__scatter_mem | 2023-10-27T13:00:49.296462Z | 2026-01-13T04:40:23.305571Z |
| osv-2021-363 | Heap-buffer-overflow in H5HG_read | 2021-02-11T00:00:41.682350Z | 2026-01-13T04:33:24.937147Z |
| osv-2021-219 | UNKNOWN READ in H5HG__cache_heap_deserialize | 2021-01-22T00:01:04.834439Z | 2026-01-13T04:32:50.029402Z |
| osv-2021-184 | Heap-buffer-overflow in H5HL__fl_deserialize | 2021-01-15T00:00:16.202094Z | 2026-01-13T04:27:53.975862Z |
| osv-2026-30 | Use-of-uninitialized-value in vp9_quantize_fp_avx2 | 2026-01-11T00:08:32.391680Z | 2026-01-11T00:08:32.392050Z |
| osv-2026-21 | Use-of-uninitialized-value in processTLSBlock | 2026-01-09T00:20:25.200679Z | 2026-01-09T00:20:25.201303Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2025-0121 | gcc crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:52:10Z |
| rustsec-2025-0119 | number_prefix crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:13:56Z |
| rustsec-2025-0118 | Unsound API access to a WebAssembly shared linear memory | 2025-11-11T12:00:00Z | 2025-11-13T16:55:40Z |
| rustsec-2025-0117 | tandem is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0116 | tandem_garble_interop is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0115 | tandem_http_server is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0114 | tandem_http_client is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0113 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-11-04T06:10:22Z |
| rustsec-2025-0109 | Out-of-bounds memory access in binary_read_to_ref and binary_write_from_ref | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0108 | Uninitialized memory exposure in string reading functions | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0107 | Uninitialized memory exposure in any_as_u8_slice | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0106 | Undefined behavior in index_of_ptr with empty slices | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0105 | Uninitialized memory exposure in create_ring_buffer | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0072 | soundness issue and unmaintained | 2025-10-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0071 | Incorrect handling of embedded SVG and MathML leads to mutation XSS after removal | 2025-09-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0068 | serde_yml crate is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0067 | `libyml::string::yaml_string_extend` is unsound and unmaintained | 2025-09-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0063 | Possible unsound public API | 2025-04-25T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0062 | Heap Buffer Overflow in the DrainCol Destructor | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0054 | ArrayQueue::push_front is not panic-safe | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0053 | Multiple memory corruption vulnerabilities in safe APIs | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0051 | `xcb::Connection::connect_to_fd*` functions violate I/O safety | 2025-08-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0050 | IdMap::from_iter may lead to uninitialized memory being freed on drop | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0049 | User-defined implementations of the safe trait scratchpad::Tracking can cause heap buffer overflows | 2025-08-14T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0044 | Four unique double-free vulnerabilities triggered via safe APIs | 2025-06-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0042 | Uninitialized read after allocating MemBump | 2025-07-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0040 | `root` appended to group listings | 2025-01-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0039 | Lack of sufficient checks in public API | 2025-05-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0038 | Out of bounds access in public safe API | 2025-04-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0037 | Pingora Request Smuggling and Cache Poisoning | 2025-05-22T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2025-49125 | Apache Tomcat: Security constraint bypass for pre/post-resources | 2025-07-10T10:47:18.953Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-24813 | Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT | 2025-07-10T10:46:47.051Z | 2026-03-20T13:43:29.174Z |
| bit-tomcat-2025-53506 | Apache Tomcat: DoS via excessive h2 streams at connection start | 2025-07-16T08:19:04.361Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2025-49124 | Apache Tomcat: exe side-loading via icalcs.exe in Tomcat installer for Windows | 2025-06-20T06:04:24.795Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2025-31651 | Apache Tomcat: Bypass of rules in Rewrite Valve | 2025-07-10T10:46:54.240Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-56337 | Apache Tomcat: RCE due to TOCTOU issue in JSP compilation - CVE-2024-50379 mitigation was incomplete | 2025-07-10T10:46:39.151Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-52317 | Apache Tomcat: Request/response mix-up with HTTP/2 | 2024-11-20T07:20:06.896Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-52316 | Apache Tomcat: Authentication bypass when using Jakarta Authentication API | 2025-07-10T10:46:05.150Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-38286 | Apache Tomcat: Denial of Service | 2024-11-09T07:20:25.873Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-34750 | Apache Tomcat: HTTP/2 excess header handling DoS | 2025-07-29T14:30:29.115Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-24549 | Apache Tomcat: HTTP/2 header handling DoS | 2025-07-17T08:09:49.355Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2024-21733 | Apache Tomcat: Leaking of unrelated request bodies in default error page | 2024-03-06T11:07:26.980Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-46589 | Apache Tomcat: HTTP request smuggling via malformed trailer headers | 2024-03-06T11:07:35.204Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-45648 | Apache Tomcat: Trailer header parsing too lenient | 2024-03-06T11:07:43.292Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-42795 | Apache Tomcat: Failure during request clean-up leads to sensitive data leaking to subsequent requests | 2024-03-06T11:08:01.506Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2023-41080 | Apache Tomcat: Open redirect with FORM authentication | 2024-03-06T11:08:22.964Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-33163 | Parse Server leaks protected fields via LiveQuery afterEvent trigger | 2026-03-20T11:37:51.448Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-33042 | Parse Server affected by empty authData bypassing credential requirement on signup | 2026-03-20T11:37:48.161Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32944 | Parse Server crash via deeply nested query condition operators | 2026-03-20T11:37:45.054Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32943 | Parse Server has a password reset token single-use bypass via concurrent requests | 2026-03-20T11:37:41.707Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32886 | Parse Server's Cloud function dispatch crashes server via prototype chain traversal | 2026-03-20T11:37:38.226Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32878 | Parse Server vulnerable to schema poisoning via prototype pollution in deep copy | 2026-03-20T11:37:35.433Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32770 | Parse Server: LiveQuery subscription with invalid regular expression crashes server | 2026-03-20T11:37:32.539Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32742 | Parse Server session creation endpoint allows overwriting server-generated session fields | 2026-03-20T11:37:29.063Z | 2026-03-20T12:05:40.000Z |
| bit-parse-2026-32728 | Parse Server has a stored XSS filter bypass via Content-Type MIME parameter and missing XML extension blocklist entries | 2026-03-20T11:37:25.520Z | 2026-03-20T12:05:40.000Z |
| bit-tomcat-2026-24733 | Apache Tomcat: Security constraint bypass with HTTP/0.9 | 2026-02-20T09:52:58.708Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-66614 | Apache Tomcat: Client certificate verification bypass due to virtual host mapping | 2026-02-20T09:52:57.300Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-61795 | Apache Tomcat: Delayed cleaning of multi-part upload temporary files may lead to DoS | 2025-11-06T13:00:35.478Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-55754 | Apache Tomcat: console manipulation via escape sequences in log messages | 2025-11-06T13:00:33.572Z | 2026-03-20T09:47:33.381Z |
| bit-tomcat-2025-55668 | Apache Tomcat: session fixation via rewrite valve | 2025-08-18T08:14:21.163Z | 2026-03-20T09:47:33.381Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ms81166 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.4.4-r2, 2.4.4-r4, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:37:27.717828Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-ls00044 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-54410, CVE-2025-58181, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.3.2-r4, 2.3.2-r5, 2.4.4-r2, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:38:02.432087Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-ir69938 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.4.4-r2, 2.5.0-r0, 2.5.1-r0, 2.5.1-r1 | 2026-04-01T09:37:08.257134Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-hx97842 | Security fixes for CVE-2025-47911, CVE-2025-47913, CVE-2025-47914, CVE-2025-54410, CVE-2025-58181, CVE-2025-58190, CVE-2025-61727, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186 applied in versions: 2.2.2-r6, 2.3.2-r4, 2.4.4-r2, 2.5.0-r0, 2.5.0-r1 | 2026-04-01T09:37:55.704076Z | 2026-03-20T11:37:58Z |
| cleanstart-2026-gu55430 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-9h8m-3fm2-qjrq, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.9.4-r0, 1.9.4-r1, 1.9.4-r2, 1.9.4-r3 | 2026-04-01T09:37:53.639715Z | 2026-03-20T04:52:14Z |
| cleanstart-2026-dp35743 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-24051, CVE-2026-24515, CVE-2026-25210, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-q9hv-hpm4-hj6x, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.7.10-r0, 1.7.10-r1, 1.7.10-r2, 1.7.10-r3, 1.9.4-r0 | 2026-04-01T09:38:30.680533Z | 2026-03-20T04:50:14Z |
| cleanstart-2026-om95908 | Security fixes for CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-qxp5-gwg8-xv66, ghsa-r92c-9c7f-3pj8, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.10.7-r1, 1.11.4-r0, 1.11.5-r0, 1.11.5-r1, 1.11.5-r2, 1.9.4-r0 | 2026-04-01T09:38:28.220463Z | 2026-03-20T04:48:45Z |
| cleanstart-2026-ad71344 | Security fixes for CVE-2024-10005, CVE-2024-10006, CVE-2025-47913, CVE-2025-47914, CVE-2025-58181, CVE-2025-61727, CVE-2025-61729, CVE-2026-1229, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-6v2p-p543-phr9, ghsa-c6gw-w398-hv78, ghsa-fv92-fjc5-jj9h, ghsa-hcg3-q754-cr77, ghsa-jc7w-c686-c4v9, ghsa-mh63-6h87-95cp, ghsa-p77j-4mvh-x3m3, ghsa-qxp5-gwg8-xv66, ghsa-vvgc-356p-c3xw, ghsa-wjrx-6529-hcj3 applied in versions: 1.10.7-r0, 1.10.7-r1, 1.10.9-r0, 1.10.9-r1, 1.10.9-r2, 1.10.9-r3, 1.9.4-r0 | 2026-04-01T09:38:56.500937Z | 2026-03-20T04:46:15Z |
| cleanstart-2026-kd93706 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.25.0-r0 | 2026-04-01T09:38:28.023266Z | 2026-03-19T12:59:29Z |
| cleanstart-2026-il36032 | Security fixes for CVE-2025-30218, CVE-2025-49005, CVE-2025-65945, ghsa-2mjp-6q6p-2qxm, ghsa-33vc-wfww-vjfv, ghsa-43fc-jf86-j433, ghsa-4992-7rv2-5pvq, ghsa-4hjh-wcwx-xvwj, ghsa-554w-wpv2-vw27, ghsa-5gfm-wpxj-wjgq, ghsa-5jpx-9hw9-2fx4, ghsa-65ch-62r8-g69g, ghsa-869p-cjfg-cm3x, ghsa-968p-4wvh-cqc8, ghsa-9g9p-9gw9-jx7f, ghsa-9qr9-h5gf-34mp, ghsa-f269-vfmq-vjvj, ghsa-fjxv-7rqg-78g4, ghsa-g9mf-h72j-4rw9, ghsa-h25m-26qc-wcjf, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-mwv6-3258-q52c, ghsa-rcmh-qjqh-p98v, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w37m-7fhw-fmv9, ghsa-xxjr-mmjv-4gpg applied in versions: 2.11.0-r0, 2.11.0-r2 | 2026-04-01T09:39:16.823043Z | 2026-03-19T12:59:29Z |
| cleanstart-2026-di15427 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-26958, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.19.0-r0 | 2026-04-01T09:38:54.759545Z | 2026-03-19T12:58:08Z |
| cleanstart-2026-ix47217 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-26958, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.18.0-r0, 0.19.0-r0 | 2026-04-01T09:39:04.589001Z | 2026-03-19T12:57:20Z |
| cleanstart-2026-qi69220 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-01T09:40:21.793084Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-kt54860 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-01T09:40:18.425287Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-ib04141 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq applied in versions: 3.7.2-r4, 3.7.2-r5 | 2026-04-01T09:40:40.529278Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-ax74442 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-01T09:41:13.499618Z | 2026-03-19T12:02:36Z |
| cleanstart-2026-kj56465 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 5.4.8-r0 | 2026-04-01T09:41:55.075579Z | 2026-03-19T07:57:48Z |
| cleanstart-2026-gs57401 | Security fixes for CVE-2025-69873, CVE-2026-1525, CVE-2026-1526, CVE-2026-1527, CVE-2026-1528, CVE-2026-2229, CVE-2026-2327, CVE-2026-2391, CVE-2026-25128, CVE-2026-25547, CVE-2026-2581, CVE-2026-25896, CVE-2026-26278, CVE-2026-26960, CVE-2026-27601, CVE-2026-27903, CVE-2026-27904, CVE-2026-27942, CVE-2026-28292, CVE-2026-29786, CVE-2026-31802, CVE-2026-32141, CVE-2026-33036, ghsa-23c5-xmqv-rm74, ghsa-25h7-pfq9-p65f, ghsa-2g4f-4pwh-qvx6, ghsa-2mjp-6q6p-2qxm, ghsa-37qj-frw5-hhjh, ghsa-38c4-r59v-3vqw, ghsa-3ppc-4f35-3m26, ghsa-4992-7rv2-5pvq, ghsa-7h2j-956f-4vf2, ghsa-7r86-cg39-jmmj, ghsa-83g3-92jg-28cx, ghsa-8gc5-j5rx-235r, ghsa-8wc6-vgrq-x6cf, ghsa-9ppj-qmqm-q256, ghsa-f269-vfmq-vjvj, ghsa-fj3w-jwp8-x2g3, ghsa-jmr7-xgp7-cmfj, ghsa-m7jm-9gc2-mpf2, ghsa-phc3-fgpg-7m6h, ghsa-qffp-2rhf-9h96, ghsa-qpx9-hpmf-5gmw, ghsa-r275-fr43-pm7q, ghsa-v9p9-hfj2-hcw8, ghsa-vrm6-8vpv-qv8q, ghsa-w7fw-mjwx-w883 applied in versions: 43.4.3-r1 | 2026-04-01T09:43:24.793409Z | 2026-03-19T07:48:38Z |
| cleanstart-2026-jd68539 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61732, CVE-2025-68121, ghsa-vvgc-356p-c3xw applied in versions: 1.7.0-r0 | 2026-04-01T09:42:09.713315Z | 2026-03-19T07:35:12Z |
| cleanstart-2026-gx29850 | Security fixes for CVE-2025-61732, CVE-2025-68121 applied in versions: 1.132.0-r0, 1.132.0-r1 | 2026-04-01T09:42:09.716696Z | 2026-03-19T07:32:54Z |
| cleanstart-2026-em40436 | Security fixes for ghsa-8v2v-wjwg-vx6r applied in versions: 1.16.3-r0 | 2026-04-01T09:42:07.970704Z | 2026-03-19T07:29:54Z |
| cleanstart-2026-ck42797 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-25679, CVE-2026-25934, CVE-2026-27139, CVE-2026-27142, ghsa-37cx-329c-33x3 applied in versions: 0.18.0-r1, 1.16.0-r0 | 2026-04-01T09:42:37.879665Z | 2026-03-19T07:29:02Z |
| cleanstart-2026-qb67682 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2xsj-vh29-9cwm, ghsa-37cx-329c-33x3, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4, 3.2.7-r0, 3.3.2-r1, 3.3.3-r0 | 2026-04-01T09:43:42.917590Z | 2026-03-19T07:11:57Z |
| cleanstart-2026-gc37751 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-66jq-2c23-2xh5, ghsa-9h8m-3fm2-qjrq applied in versions: 0.65.0-r0, 0.65.0-r1 | 2026-04-01T09:43:05.536029Z | 2026-03-19T07:09:40Z |
| cleanstart-2026-mq21261 | Security fixes for CVE-2025-47911, CVE-2025-58190, CVE-2025-61726, CVE-2025-61727, CVE-2025-61728, CVE-2025-61729, CVE-2025-61730, CVE-2025-61732, CVE-2025-68119, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27141, CVE-2026-27142 applied in versions: 1.5.1-r0, 1.5.1-r1, 1.5.1-r2, 1.5.1-r3 | 2026-04-01T09:43:56.426341Z | 2026-03-19T07:05:59Z |
| cleanstart-2026-bt99405 | Security fixes for CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142 applied in versions: 1.29.2-r0, 1.29.2-r1 | 2026-04-01T09:43:54.267145Z | 2026-03-19T07:01:48Z |
| cleanstart-2026-iy78242 | Security fixes for CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, ghsa-273p-m2cw-6833, ghsa-4c4x-jm2x-pf9j, ghsa-4qg8-fj49-pxjh, ghsa-59jp-pj84-45mr, ghsa-72c7-4g63-hpw5, ghsa-846p-jg2w-w324, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-f83f-xpx7-ffpw, ghsa-fcv2-xgw5-pqxf, ghsa-fphv-w9fq-2525, ghsa-fw7p-63qq-7hpr, ghsa-j5w8-q4qc-rx2x, ghsa-jqc5-w2xx-5vq4, ghsa-p436-gjf2-799p, ghsa-whqx-f9j3-ch6m applied in versions: 0.26.0-r0, 0.26.0-r1, 0.26.0-r2, 0.26.0-r3, 0.26.0-r4 | 2026-04-01T09:44:29.089231Z | 2026-03-19T06:58:14Z |
| cleanstart-2026-pj76318 | Security fixes for CVE-2025-61732, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-26958, CVE-2026-27139, CVE-2026-27142, ghsa-273p-m2cw-6833, ghsa-4c4x-jm2x-pf9j, ghsa-4qg8-fj49-pxjh, ghsa-846p-jg2w-w324, ghsa-fcv2-xgw5-pqxf, ghsa-fphv-w9fq-2525, ghsa-jqc5-w2xx-5vq4, ghsa-whqx-f9j3-ch6m applied in versions: 1.14.1-r0, 1.14.1-r1, 1.14.1-r2, 1.14.1-r3 | 2026-04-01T09:44:23.291711Z | 2026-03-19T06:56:15Z |
| cleanstart-2026-gr86205 | Security fixes for CVE-2022-23181, CVE-2022-29885, CVE-2022-34305, CVE-2022-42252, CVE-2022-45143, CVE-2023-24998, CVE-2023-28708, CVE-2026-24515, CVE-2026-25210 applied in versions: 11.0.18-r0, 9.0.58-r0, 9.0.63-r0, 9.0.64-r0, 9.0.68-r0, 9.0.70-r0, 9.0.71-r0, 9.0.73-r0, 9.0.80-r0 | 2026-04-01T09:45:02.431388Z | 2026-03-19T05:47:18Z |
| cleanstart-2026-ox88144 | Security fixes for CVE-2025-47911, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61732, CVE-2026-27139 applied in versions: 1.34.1-r0, 1.34.1-r2 | 2026-04-01T09:45:10.149925Z | 2026-03-18T13:13:46Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2020-ALE-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| certfr-2020-ale-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| CERTFR-2020-ALE-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| CERTFR-2020-ALE-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| certfr-2020-ale-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| CERTFR-2020-ALE-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| CERTFR-2020-ALE-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| certfr-2020-ale-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| CERTFR-2020-ALE-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| CERTFR-2020-ALE-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| CERTFR-2020-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0249 | Multiples vulnérabilités dans les produits IBM | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0248 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0247 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0246 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0245 | Vulnérabilité dans Zabbix | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0244 | Vulnérabilité dans Nextcloud Flow | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0243 | Vulnérabilité dans SPIP | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0242 | Multiples vulnérabilités dans les produits Cisco | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0241 | Vulnérabilité dans ClamAV | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0240 | Vulnérabilité dans CPython | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0239 | Multiples vulnérabilités dans Google Chrome | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0238 | Vulnérabilité dans NetApp ONTAP 9 | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0237 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0236 | Multiples vulnérabilités dans Traefik | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0235 | Multiples vulnérabilités dans HPE Aruba Networking AOS | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0234 | Vulnérabilité dans Tenable Nessus Manager | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0233 | Multiples vulnérabilités dans Google Pixel | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0232 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0231 | Multiples vulnérabilités dans Google Android | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0230 | Multiples vulnérabilités dans Docker Desktop | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0217 | Multiples vulnérabilités dans SPIP | 2026-02-26T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0229 | Multiples vulnérabilités dans MISP | 2026-03-02T00:00:00.000000 | 2026-03-02T00:00:00.000000 |
| certfr-2026-avi-0228 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-02T00:00:00.000000 | 2026-03-02T00:00:00.000000 |
| certfr-2026-avi-0227 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0226 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0225 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0224 | Multiples vulnérabilités dans les produits IBM | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0223 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0222 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0221 | Multiples vulnérabilités dans les produits Centreon | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000056 | Multiple vulnerabilities in Sato label printers CL4/6NX Plus and CL4/6NX-J Plus series | 2025-08-06T16:38+09:00 | 2025-08-06T16:38+09:00 |
| jvndb-2025-010603 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation MFPs | 2025-08-05T11:29+09:00 | 2025-08-05T11:29+09:00 |
| jvndb-2025-010408 | Multiple vulnerabilities in PowerCMS | 2025-08-01T12:05+09:00 | 2025-08-01T12:05+09:00 |
| jvndb-2025-000055 | ZXHN-F660T and ZXHN-F660A use a common credential for all installations | 2025-07-31T15:12+09:00 | 2025-07-31T15:12+09:00 |
| jvndb-2025-000054 | Apache Jena Fuseki vulnerable to path traversal | 2025-07-30T14:17+09:00 | 2025-07-30T14:17+09:00 |
| jvndb-2025-000053 | "SwitchBot" App vulnerable to insertion of sensitive information into log file | 2025-07-29T13:44+09:00 | 2025-07-29T13:44+09:00 |
| jvndb-2025-010056 | TP-Link VIGI NVR1104H-4P and VIGI NVR2016H-16MP vulnerable to OS command injection | 2025-07-28T17:53+09:00 | 2025-07-28T17:53+09:00 |
| jvndb-2025-000052 | TP-Link Archer C1200 vulnerable to clickjacking | 2025-07-24T14:16+09:00 | 2025-07-24T14:16+09:00 |
| jvndb-2025-000051 | Real-time Bus Tracking System vulnerable to improper validation of specified quantity in input | 2025-07-23T13:54+09:00 | 2025-07-23T13:54+09:00 |
| jvndb-2025-009576 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-07-23T11:13+09:00 | 2025-07-23T11:13+09:00 |
| jvndb-2025-000050 | "region PAY" App for Android vulnerable to insertion of sensitive information into log file | 2025-07-22T13:33+09:00 | 2025-07-22T13:33+09:00 |
| jvndb-2025-009150 | Security updates for Trend Micro products (June 2025) | 2025-07-17T17:03+09:00 | 2025-07-17T17:03+09:00 |
| jvndb-2025-000030 | Reflected cross-site scripting vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2025-05-12T18:00+09:00 | 2025-07-17T10:06+09:00 |
| jvndb-2025-000049 | ZWX-2000CSW2-HN and ZWX-2000CS2-HN vulnerable to use of hard-coded credentials | 2025-07-16T13:54+09:00 | 2025-07-16T13:54+09:00 |
| jvndb-2025-008881 | Least Privilege Violation Vulnerability in the communications functions of NJ/NX series Machine Automation Controllers | 2025-07-15T15:54+09:00 | 2025-07-15T15:54+09:00 |
| jvndb-2025-008783 | Firebox T15 contains an issue with hidden functionality | 2025-07-14T17:22+09:00 | 2025-07-14T17:22+09:00 |
| jvndb-2025-008145 | Epson Web Installer for Mac vulnerable to missing authentication for critical function | 2025-07-08T14:08+09:00 | 2025-07-08T14:08+09:00 |
| jvndb-2025-008106 | Heap-based buffer overflow vulnerability in V-SFT and TELLUS | 2025-07-07T16:26+09:00 | 2025-07-07T16:26+09:00 |
| jvndb-2025-008105 | Windows shortcut following (.LNK) vulnerability in Trend Micro Security for Windows (CVE-2025-52521) | 2025-07-07T16:04+09:00 | 2025-07-07T16:04+09:00 |
| jvndb-2025-000047 | Multiple vulnerabilities in Nimesa Backup and Recovery | 2025-07-07T15:26+09:00 | 2025-07-07T15:26+09:00 |
| jvndb-2025-007978 | Multiple vulnerabilities in Trend Micro Password Manager for Windows (CVE-2025-48443, CVE-2025-52837) | 2025-07-04T13:28+09:00 | 2025-07-04T13:28+09:00 |
| jvndb-2025-000045 | Multiple vulnerabilities in Active! mail | 2025-07-02T14:13+09:00 | 2025-07-02T14:13+09:00 |
| jvndb-2025-007754 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2025-07-02T11:31+09:00 | 2025-07-02T11:31+09:00 |
| jvndb-2025-007607 | Pass-Back Attack vulnerability in Konica Minorta bizhub series | 2025-07-01T14:09+09:00 | 2025-07-01T14:09+09:00 |
| jvndb-2025-007595 | Multiple vulnerabilities in Web Connection of Konica Minolta MFPs | 2025-07-01T14:02+09:00 | 2025-07-01T14:02+09:00 |
| jvndb-2025-000046 | SLNX Help Documentation of RICOH Streamline NX vulnerable to reflected cross-site scripting | 2025-06-30T15:45+09:00 | 2025-06-30T15:45+09:00 |
| jvndb-2025-007552 | Multiple vulnerabilities in TB-eye network recorders and AHD recorders | 2025-06-30T14:45+09:00 | 2025-06-30T14:45+09:00 |
| jvndb-2024-004595 | Multiple vulnerabilities in FutureNet NXR series, VXR series and WXR series | 2024-07-29T17:51+09:00 | 2025-06-30T09:56+09:00 |
| jvndb-2025-000043 | Multiple vulnerabilities in iroha Board | 2025-06-26T15:13+09:00 | 2025-06-26T15:13+09:00 |
| jvndb-2025-000042 | Inefficient regular expressions in GROWI | 2025-06-24T15:25+09:00 | 2025-06-24T15:25+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-14835 | OpenClaw授权绕过漏洞(CNVD-2026-14835) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14834 | OpenClaw存在未明漏洞(CNVD-2026-14834) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14833 | OpenClaw身份验证绕过漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14832 | OpenClaw存在未明漏洞(CNVD-2026-14832) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14831 | OpenClaw授权绕过漏洞 | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14830 | OpenClaw存在未明漏洞(CNVD-2026-14830) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14829 | OpenClaw存在未明漏洞(CNVD-2026-14829) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14828 | OpenClaw存在未明漏洞(CNVD-2026-14828) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14827 | OpenClaw数据伪造问题漏洞(CNVD-2026-14827) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14826 | OpenClaw信息泄露漏洞(CNVD-2026-14826) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-14825 | OpenClaw拒绝服务漏洞(CNVD-2026-14825) | 2026-03-24 | 2026-03-25 |
| cnvd-2026-15249 | TOTOLINK WA300操作系统命令注入漏洞 | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14687 | Belkin F9K1015命令注入漏洞 | 2025-10-13 | 2026-03-24 |
| cnvd-2026-14686 | Belkin F9K1122堆栈缓冲区溢出漏洞(CNVD-2026-14686) | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14685 | TRENDnet TEW-822DRE权限提升漏洞 | 2025-08-15 | 2026-03-24 |
| cnvd-2026-14684 | TRENDnet TEW-657BRM命令注入漏洞 | 2025-11-28 | 2026-03-24 |
| cnvd-2026-14683 | TRENDnet TEW-822DRE命令注入漏洞 | 2026-01-12 | 2026-03-24 |
| cnvd-2026-14682 | TRENDnet TEW-800MB命令注入漏洞 | 2026-01-12 | 2026-03-24 |
| cnvd-2026-14681 | TRENDnet TEW-713RE操作系统命令注入漏洞 | 2026-01-14 | 2026-03-24 |
| cnvd-2026-14680 | TRENDnet TEW-632BRP缓冲区溢出漏洞 | 2026-03-19 | 2026-03-24 |
| cnvd-2026-14679 | IBM Db2拒绝服务漏洞(CNVD-2026-14679) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14678 | IBM Db2拒绝服务漏洞(CNVD-2026-14678) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14677 | IBM Db2存在未明漏洞(CNVD-2026-14677) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14676 | IBM Db2拒绝服务漏洞(CNVD-2026-14676) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14675 | IBM Db2拒绝服务漏洞(CNVD-2026-14675) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14674 | IBM Db2拒绝服务漏洞(CNVD-2026-14674) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14673 | IBM Db2拒绝服务漏洞(CNVD-2026-14673) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14672 | IBM Db2拒绝服务漏洞(CNVD-2026-14672) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14671 | IBM Db2拒绝服务漏洞(CNVD-2026-14671) | 2026-02-11 | 2026-03-24 |
| cnvd-2026-14670 | IBM Db2拒绝服务漏洞(CNVD-2026-14670) | 2026-02-11 | 2026-03-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-15548 | Уязвимость компонента jfs/file.c ядра операционной системы Linux, позволяющая нарушителю … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15547 | Уязвимость компонента fs/ext4/inline.c ядра операционной системы Linux, позволяющая наруш… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15546 | Уязвимость драйвера gve ядра операционной системы Linux, позволяющая нарушителю вызвать о… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15545 | Уязвимость компонента arch/parisc/kernel/syscall.S ядра операционной системы Linux, позво… | 11.12.2025 | 16.02.2026 |
| bdu:2025-15544 | Уязвимость компонента arch/parisc/include/asm/uaccess.h ядра операционной системы Linux, … | 11.12.2025 | 16.02.2026 |
| bdu:2025-15543 | Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | 11.12.2025 | 16.02.2026 |
| bdu:2025-15289 | Уязвимость функции atmtcp_recv_control() ядра операционной системы Linux, позволяющая нар… | 08.12.2025 | 16.02.2026 |
| bdu:2025-15261 | Уязвимость компонента hid-asus.c ядра операционной системы Linux, позволяющая нарушителю … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15252 | Уязвимость функции sctp_v6_from_sk() ядра операционной системы Linux, позволяющая нарушит… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15248 | Уязвимость функции btrfs_copy_root() компонента btrfs ядра операционной системы Linux, по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15240 | Уязвимость функции blk_stack_limits() компонента block/blk-settings.c ядра операционной с… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15238 | Уязвимость библиотеки resolv языка программирования Ruby, позволяющая нарушителю вызвать … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15231 | Уязвимость функции tls_do_decryption() (net/tls/tls_sw.c) ядра операционной системы Linux… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15230 | Уязвимость функций ovl_encode_real_fh() (fs/overlayfs/copy_up.c) и show_mark_fhandle() (f… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15228 | Уязвимость системы мониторинга ИТ-инфраструктуры Zabbix, связанная с хранением пароля в н… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15227 | Уязвимость ядра операционной системы Linux, связанная с ошибками инициализации памяти, по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15226 | Уязвимость компонента drivers/soc/qcom/mdt_loader.c ядра операционной системы Linux, позв… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15225 | Уязвимость модуля vfs_streams_xattr пакета программ сетевого взаимодействия Samba, позвол… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15224 | Уязвимость функции Item_direct_view_ref::derived_field_transformer_for_where системы упра… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15223 | Уязвимость функции pci_epf_remove_cfs() компонента drivers/pci/endpoint/pci-epf-core.c яд… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15222 | Уязвимость функции JOIN::fix_all_splittings_in_plan системы управления базами данных Mari… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15221 | Уязвимость системы управления базами данных MariaDB, связанная с неправильным порядком по… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15220 | Уязвимость функции jbd2_log_do_checkpoint() компонента fs/jbd2/checkpoint.c ядра операцио… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15218 | Уязвимость функции relocate_one_folio() модуля fs/btrfs/relocation.c поддержки файловой с… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15216 | Уязвимость функций EXPORT_SYMBOL(), destroy_cm_id() и cm_work_handler() ядра операционной… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15213 | Уязвимость функции usb_parse_ss_endpoint_companion() компонента drivers/usb/core/config.c… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15212 | Уязвимость компонента fs/btrfs/qgroup.c ядра операционной системы Linux, позволяющая нару… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15211 | Уязвимость компонента fs ядра операционной системы Linux, позволяющая нарушителю вызвать … | 05.12.2025 | 16.02.2026 |
| bdu:2025-15209 | Уязвимость компонента media/usb/usbtv/usbtv-video.c ядра операционной системы Linux, позв… | 05.12.2025 | 16.02.2026 |
| bdu:2025-15201 | Уязвимость компонента qcom/venus/core.c ядра операционной системы Linux, позволяющая нару… | 05.12.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-201106-0026 | Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Wind… | 2024-07-23T22:03:48.916000Z |
| var-202005-1028 | A malicious actor who intentionally exploits this lack of effective limitation on the num… | 2024-07-23T22:03:40.061000Z |
| var-201911-1619 | Improper invalidation for page table updates by a virtual guest operating system for mult… | 2024-07-23T22:03:40.870000Z |
| var-201505-0337 | The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorit… | 2024-07-23T22:03:40.995000Z |
| var-201912-0533 | This issue was addressed with improved transparency. This issue is fixed in iOS 12.2. A u… | 2024-07-23T22:03:39.534000Z |
| var-201908-0265 | Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a … | 2024-07-23T22:03:39.695000Z |
| var-200103-0056 | Network Dynamic Data Exchange (DDE) in Windows 2000 allows local users to gain SYSTEM pri… | 2024-07-23T22:03:07.478000Z |
| var-202109-1368 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-07-23T22:03:02.962000Z |
| var-200609-1249 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2024-07-23T22:03:02.065000Z |
| var-201904-1344 | Multiple memory corruption issues were addressed with improved input validation. This iss… | 2024-07-23T22:03:00.873000Z |
| var-202108-2039 | A logic issue was addressed with improved state management. This issue is fixed in macOS … | 2024-07-23T22:02:34.481000Z |
| var-201006-1259 | Double free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 1… | 2024-07-23T22:02:34.562000Z |
| var-201707-0592 | Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre att… | 2024-07-23T22:02:33.954000Z |
| var-201109-0190 | Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allow… | 2024-07-23T22:02:33.523000Z |
| var-200803-0016 | CFNetwork in Apple Mac OS X 10.4.11 allows remote HTTPS proxy servers to spoof secure web… | 2024-07-23T22:01:55.420000Z |
| var-201912-1850 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T22:01:51.188000Z |
| var-200609-1027 | Buffer overflow in PPP on Apple Mac OS X 10.4.x up to 10.4.8 and 10.3.x up to 10.3.9, whe… | 2024-07-23T22:01:14.362000Z |
| var-201904-1408 | A memory corruption issue was addressed with improved state management. This issue affect… | 2024-07-23T22:01:11.971000Z |
| var-202201-0372 | lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow. The vu… | 2024-07-23T22:01:10.106000Z |
| var-200612-0136 | Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 2005… | 2024-07-23T22:01:10.008000Z |
| var-201609-0593 | Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.… | 2024-07-23T22:01:08.857000Z |
| var-201304-0375 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.426000Z |
| var-201210-0270 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T22:01:08.344000Z |
| var-200603-0279 | Directory traversal vulnerability in the BOM framework in Mac OS X 10.x before 10.3.9 and… | 2024-07-23T22:01:08.748000Z |
| var-201904-1397 | An input validation issue was addressed with improved input validation. This issue affect… | 2024-07-23T22:01:07.123000Z |
| var-200704-0213 | load_webdav in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environme… | 2024-07-23T22:00:36.528000Z |
| var-201711-0480 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:59:32.421000Z |
| var-200102-0030 | The Web interface to Cisco 600 routers running CBOS 2.4.1 and earlier allow remote attack… | 2024-07-23T21:59:32.267000Z |
| var-202207-0381 | A OS Command Injection vulnerability exists in Node.js versions <14.20.0, <16.20.0, <18.5… | 2024-07-23T21:59:00.866000Z |
| var-201801-1708 | The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before… | 2024-07-23T21:58:56.016000Z |